Uploaded by Laizrangels

David Weisburd (editor), Ernesto U. Savona (editor), Badi Hasisi (editor), Francesco Calderoni (editor) - Understanding Recruitment to Organized Crime and Terrorism (2020, Springer) - libgen.lc

advertisement
David Weisburd
Ernesto U. Savona
Badi Hasisi
Francesco Calderoni Editors
Understanding
Recruitment
to Organized
Crime and
Terrorism
Understanding Recruitment to Organized Crime
and Terrorism
David Weisburd • Ernesto U. Savona
Badi Hasisi • Francesco Calderoni
Editors
Understanding Recruitment
to Organized Crime and
Terrorism
Editors
David Weisburd
Institute of Criminology
Faculty of Law
Hebrew University of Jerusalem
Jerusalem, Israel
Department of Criminology
Law and Society
George Mason University
Fairfax, Virginia, USA
Ernesto U. Savona
Transcrime
Università Cattolica del Sacro Cuore
Milan, Italy
Francesco Calderoni
Transcrime
Università Cattolica del Sacro Cuore
Milan, Italy
Badi Hasisi
Institute of Criminology
Faculty of Law
Hebrew University of Jerusalem
Jerusalem, Israel
ISBN 978-3-030-36638-4 ISBN 978-3-030-36639-1 (eBook)
https://doi.org/10.1007/978-3-030-36639-1
© Springer Nature Switzerland AG 2020
Chapter “Delinquent development, employment and income in a sample of Dutch organized crime
offenders: Shape, content, and correlates of delinquent trajectories from age 12 to 65” is licensed under
the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/
licenses/by/4.0/). For further details see license information in the chapter.
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of
the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology
now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors, and the editors are safe to assume that the advice and information in this book
are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the
editors give a warranty, expressed or implied, with respect to the material contained herein or for any
errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional
claims in published maps and institutional affiliations.
This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Contents
Introduction������������������������������������������������������������������������������������������������������ 1
David Weisburd, Ernesto U. Savona, Badi Hasisi,
and Francesco Calderoni
Part I Factors Affecting Radicalization and Recruitment to Terrorism
What Is the State of the Quantitative Literature on Risk Factors
for Radicalization and Recruitment to Terrorism?�������������������������������������� 25
Michael Wolfowicz, Yael Litmanovitz, David Weisburd, and Badi Hasisi
Resilience against Political and Religious Extremism,
Radicalization, and Related Violence: A Systematic Review
of Studies on Protective Factors���������������������������������������������������������������������� 55
Friedrich Lösel, Doris Bender, Irina Jugl, and Sonja King
Terrorist Recidivism in Israel: Rates, Patterns and Risk Factors �������������� 85
Tomer Carmel, Michael Wolfowicz, Badi Hasisi, and David Weisburd
Unintended Negative Outcomes of Counter-Terrorism Policing:
Procedural (in)Justice and Perceived Risk of Recruitment
into Terrorism�������������������������������������������������������������������������������������������������� 105
Justice Tankebe
The Link Between Prior Criminal Record and Violent Political
Extremism in the United States���������������������������������������������������������������������� 121
Michael A. Jensen, Aaron Safer-Lichtenstein, Patrick A. James,
and Gary LaFree
v
vi
Contents
Testing a Threat Model of Terrorism: A Multi-method Study About
Socio-­Economic and Psychological Influences on Terrorism
Involvement in the Netherlands���������������������������������������������������������������������� 147
Vanja Ljujic, Inge Versteegt, Frank Weerman, Fabienne Thijs,
Jan-­Willem van Prooijen, Fatima el Bouk, and Steve van de Weijer
Part II Factors Affecting Recruitment to Organized Crime
Systematic Review of the Social, Psychological and Economic Factors
Relating to Involvement and Recruitment into Organized Crime�������������� 175
Tommaso Comunale, Francesco Calderoni, Martina Marchesi,
Elisa Superchi, and Gian Maria Campedelli
Socio-Economic Inequalities and Organized Crime:
An Empirical Analysis ������������������������������������������������������������������������������������ 205
Michele Battisti, Giovanni Bernardo, Antri Konstantinidi,
Andros Kourtellos, and Andrea Mario Lavezzi
The Criminal Careers of Italian Mafia Members���������������������������������������� 241
Ernesto U. Savona, Francesco Calderoni, Gian Maria Campedelli,
Tommaso Comunale, Marco Ferrarini, and Cecilia Meneghini
Investigating the Psychological Profile of Organized Crime Members ������� 269
Gerardo Salvato, Maria Laura Fiorina, Daniela Ovadia,
Gabriele De Maio, Elisa Francescon, and Gabriella Bottini
Traffickers in Transit: Analysing the Logistics and Involvement
Mechanisms of Organised Crime at Logistical Nodes in the
Netherlands: Empirical Results of the Dutch Organised
Crime Monitor ������������������������������������������������������������������������������������������������ 277
Renushka Madarie and Edwin W. Kruisbergen
Delinquent Development, Employment and Income in a Sample
of Dutch Organized Crime Offenders: Shape, Content,
and Correlates of Delinquent Trajectories from Age 12 to 65 �������������������� 309
Victor van der Geest, M. Vere van Koppen, and Edward R. Kleemans
Index������������������������������������������������������������������������������������������������������������������ 337
About the Editors
David Weisburd is a Distinguished Professor at George Mason University and
Director of the Center for Evidence-Based Crime Policy. He is also the Walter
E. Meyer Professor of Law and Criminal Justice at the Hebrew University Faculty
of Law in Jerusalem. He serves as Chief Science Advisor at the Police Foundation
in Washington DC and is Chair of its Research Advisory Committee. He has
received many awards for his contributions to criminology and crime prevention.
These include the Stockholm Prize in Criminology (2010); the Klachky Family
Prize for the Advancement of the Frontiers of Science (2011); the Jerry Lee Award
for Lifetime Achievement in Experimental Criminology (Division of Experimental
Criminology, ASC, 2014); the Robert Boruch Award for distinctive contributions to
research that influences public policy of the Campbell Collaboration (2014); the
Sutherland Award for “outstanding contributions to the discipline of criminology”
(ASC, 2014); the Israel Prize (generally regarded as the State of Israel’s highest
civilian honor) (2015); the Mentoring Award for “excellence in mentorship in the
discipline of Criminology and Criminal Justice” (ASC, 2016); and the August
Vollmer Award for contributions to the prevention of crime (ASC, 2017).
Ernesto U. Savona is Director of TRANSCRIME, Joint Research Centre of the
Università Cattolica del Sacro Cuore and the Università degli Studi di Trento, and
since 2003, he is Professor of Criminology at the Università Cattolica del Sacro
Cuore in Milan. From 1986 to 2002, he was Professor of Criminology at the Faculty
of Law at the Università degli Studi di Trento. In 2003, he was appointed Editor in
Chief of the European Journal on Criminal Policy and Research, an international
refereed Journal published by Springer. He is also Editor in Chief of the series
Research in Brief in International and Comparative Criminology published by
Springer. He has been consultant to the United Nations, Council of Europe, the
European Union, and various national governments. He was also nominated
President of the European Society of Criminology for the years 2003/2004. In June
2011, he was appointed Chair for the term 2011–2012 of the Global Agenda Council
on Organized Crime del World Economic Forum.
vii
viii
About the Editors
Badi Hasisi serves as an Associate Professor and Chair of the Institute of
Criminology, Faculty of Law, The Hebrew University. His work focuses on the
interaction between community and the criminal justice agencies, with specific
emphasis on the particular problems faced by minority groups with the criminal
justice system. He also specializes in homeland security ad terrorism. In the last
3 years, he received about 900,000 € from the European Commission to study terrorism. He also specializes in evaluating innovations in the criminal justice system.
Prof. Hasisi also specializes in the legal history of Mandate Palestine. His recent
study focuses on analyzing the reaction of the British court system during the
Mandate in Palestine to family honor crimes, especially among the Arab community. He received the 2018 best article prize of the Israeli Organization of Law and
History and the Fattal Prize for Excellence in Legal Research and Criminology.
Prof. Hasisi also serves as the Executive Editor of the Journal of Quantitative
Criminology.
Francesco Calderoni is Associate Professor at the Faculty of Social and Political
Sciences at Università Cattolica del Sacro Cuore and Researcher at Transcrime Joint
Research Centre of the Università Cattolica del Sacro Cuore, the University of
Bologna, and the University of Perugia. He is Coordinator of the International
Ph.D. in Criminology and of the master curriculum in Policies for Security at the
M.Sc. in Public Policies at the Università Cattolica in Milan. He is Associate Editor
at Global Crime. He was awarded the Ambrosoli Prize 2010 by the Milan City
Council for the best Ph.D. thesis and the Canada-Italy innovation award 2014 by the
Canadian Embassy in Italy for the application of network analysis methods to criminal organizations.
Introduction
David Weisburd, Ernesto U. Savona, Badi Hasisi, and Francesco Calderoni
The New York Mafia has launched an unprecedented recruitment drive after deaths, defections and the unwelcome interventions of the FBI have cut the number of “wise guys” under
its command by more than 10 per cent in a year. Numbers on the streets fell from 634 to 570
during 2000, according to the FBI, prompting the Italian crime families that still run many
of the city’s drugs, gambling, extortion and prostitution rackets to “open the books” to new
members… The existence of the recruitment drive was confirmed to the authorities by an
informant, Michael “Cookie” Durso.”
Short-staffed Mafia makes a job offer you can’t refuse. The Daily Telegraph
(Leith 2002)
Britain’s most senior counter-terrorism officer has said the police and security services are
no longer enough to win the fight against violent extremism, and the UK must instead
improve community cohesion, social mobility and education. In his first major interview
since taking up his post last year, the Metropolitan police assistant commissioner Neil Basu
told the Guardian that up to 80% of those who wanted to attack the UK were British-born
or raised, which strongly indicated domestic social issues were among the root causes.
Grievances held by people who were “malleable” to terrorist recruitment were highly dangerous, he said, calling for sociologists and criminologists to take a leading role in helping
police tackle the problem.
Counter-terror chief says policing alone cannot beat extremism. The Guardian
(Dodd 2019)
Organized crime and terrorism stand as two of the key threats to social organization and government in Western countries today (Shaw and Mahadevan 2018).
Organized crime stands behind many illegal enterprises that cater to public desires
that the government seeks to control. These include prostitution, drugs, gambling,
and protection rackets, which have formed a key aspect of organized criminal
D. Weisburd (*)
Institute of Criminology, Faculty of Law, Hebrew University of Jerusalem, Jerusalem, Israel
Department of Criminology, Law and Society, George Mason University,
Fairfax, Virginia, USA
e-mail: dweisbur@gmu.edu
E. U. Savona · F. Calderoni
Transcrime, Università Cattolica del Sacro Cuore Transcrime, Milan, Italy
B. Hasisi
Institute of Criminology, Faculty of Law, Hebrew University of Jerusalem, Jerusalem, Israel
© Springer Nature Switzerland AG 2020
D. Weisburd et al. (eds.), Understanding Recruitment to Organized Crime
and Terrorism, https://doi.org/10.1007/978-3-030-36639-1_1
1
2
D. Weisburd et al.
behaviour for the last century or more (Shelley 1995; Albanese 2014). But organized crime has also been key in creating competitive economies for goods that are
highly taxed, like cigarette sales or liquor (Savona et al. 2017). And importantly,
organized crime groups have often resorted to violence, infiltrated the legal ­economy,
and undermined legal and political institutions to protect their control over these
enterprises (Fleenor 2003; Savona et al. 2016).
Terrorism has served as a more recent threat in Western democracies, though terrorism has operated in one form or another for centuries or even millennia (Rapoport
1983, 2004). Already in ancient times Cicero rallied the Roman government to act
harshly against terrorism, when Catiline conspired to assassinate government officials and set the city ablaze.1 Nevertheless, it is only in more recent times, especially
since the events of 9/11, that terrorism has become a more central focus of policy in
Western countries.
The goals of terrorists differ from organized criminals, in that their primary interests are in changing political or social systems, rather than simply protecting their
economic or social control over specific industries. Nonetheless, terrorism, whether
left or right-wing or religiously motivated, and organized criminal organizations,
whether mafias, gangs, or other entities, have impacted social order in most Western
democracies--whether reflected in heightened levels of fear among citizens who
become afraid to carry out their daily routines (e.g. Mesch 2000; Malik et al. 2018),
or changes in security procedures that restrict everyday access to public and private
institutions (White 1998) or increases in aggressive security procedures against specific ethnic, national, religious or racial groups (Wolfendale 2007). Additionally,
different sectors of the economy can potentially suffer damages as the result of both
terrorism (e.g. Berrebi and Klor 2010; Aslam et al. 2018) and organized crime (e.g.
Lavezzi 2014; Calderoni 2014; Pinotti 2015). The impacts of terrorism, like organized crime, are broadly spread across the social systems of modern democracies.
In recent years, multinational governmental bodies have placed an increasing
focus on the need to cooperate to combat both organized crime and terrorism,
reflected in multiple UN resolutions. A host of organizations have either been created for this expressed purpose, or have adjusted their scope and focus towards such
objectives. For example, INTERPOL and EUROPOL expanded their mandate to
include deeper cooperation on combatting both organized crime and terrorism following the events of 9/11 (Deflem 2007). In recent years, organizations such as the
United Nations Office on Drugs and Crime (UNODC) have taken on an increased
interest not only in transnational organized crime networks but in issues pertaining
to terrorism as well. Meanwhile, a host of other organizations, such as the Action
against Terrorism Unit (ATU) of the Organization for Security and Co-operation in
Europe (OSCE), have been created for the express purpose of combatting organized
crime and terrorism, and specifically facilitating cooperation towards these goals).
M. Tullius Cicero. The Orations of Marcus Tullius Cicero, literally translated by C. D. Yonge,
B. A. London. Henry G. Bohn, York Street, Covent Garden. 1856.
1
Introduction
3
Both types of crime cross traditional jurisdictional boundaries. Many of the
activities of organized crime now cross national borders, whether they involve
human trafficking, or the networks of distribution of drugs or guns, or money laundering and other financial crimes (Kleemans, Soudijn and Weenink 2013). Similarly,
terrorists no longer focus simply on the immediate, local or national grievances that
have often sparked their emergence. Not only do terrorists’ grievances, doctrines,
and movements cross national borders, but even terrorist actors themselves. The
skyjackings of the 1960’s demonstrated to the western world that terrorists were
prepared to carry out attacks on ‘foreign soil’, and that terrorism had become ‘internationalized’ (Hasisi et al. 2019). As Attorney General John Ashcroft commented in
2002, “The menace of terrorism knows no borders, political or geographic.”
A key question is whether there is reason to study organized crime and terrorism
in a single research program. The fact that they both raise key threats to social order,
does not mean that they have enough commonality to encourage academic focus, or
similar prevention approaches. While for several decades the study of organized
crime and terrorism have proceeded in parallel, since the early 1990’s there has been
an emerging interest in research on the overlaps between these two phenomena.
Some of this research emphasized the important links between organized crime and
terrorism, not only conceptually, but also in terms of the actors, and at the levels of
activities, cooperation and organization (Bassiouni 1990; Schmid 1996; Taylor and
Horgan 1999; Williams 1998; Clarke and Newman 2006; Decker and Pyrooz 2011,
2014; Basra and Neumann 2017). Additionally, some scholars argued that organized crime groups and terrorist groups may interchangeably engage in both criminal and terroristic activities, and that both types of groups may even cooperate with
each other in furtherance of their mutual and exclusive goals (Makarenko 2004;
Mullins 2009; Schmid 2018).
Within this growing research interest, however, some scholars have also cautioned against overstating the overlap between terrorism and organized crime
(Hutchinson and O’malley 2007; Dishman, 2001, 2005), emphasizing that violent
extremists and gang members in the US for example differ in terms of several personal characteristics (Pyrooz et al. 2018), and that there remain important differences in their origins and goals (Desmond and Hussain 2017; Felbab-Brown 2019).
Overall, while the possible overlap between terrorism and organized crime is certainly a central issue in recent study of complex forms of group criminality, the
debate on the theoretical, conceptual, and actual extent of overlap is still open and
will likely be settled through “painstaking empirical research” (Bovenkerk and
Chakra 2005, 13). With the purpose of contributing to this debate, our research program sought to contribute knowledge both to our understanding of recruitment into
organized crime and terrorism.
Recruitment has long been a key issue for control and study of gangs, although
less so for organized crime and terrorism (Densley 2012; Smith 2014; Finelli 2019;
Leukfeldt and Kleemans 2019). Yet, as the news articles above suggest, whether in
the case of organized crime or terrorism, recruitment raises important concerns for
social control of these phenomena. In New York, during a period in the early 2000s,
when organized crime groups were under tremendous pressure from police and
4
D. Weisburd et al.
prosecutors, the Mafia sought to increase recruitment. Recently, police agencies
have begun to recognize that recruitment to terrorism is intrinsically linked to the
social grievances and social conditions of communities in Western democracies.
Recruitment is a key issue in the long term control of terrorism and organized crime.
And at least from initial studies it appears that for both organized crime and terrorism, potential recruits tend to be drawn from the same general pool of the p­ opulation
(Basra and Neumann 2017), and that their pathways to recruitment have strong
similarities (Benavides et al. 2016; Vishnevetsky 2009).
But the body of research on recruitment remains relatively sparse. Over the years
it has been estimated that as little as a few percent of radicalization research
(Neumann and Kleinmann 2013), and terrorism research more broadly (Sageman
2014) is quantitative or data driven. Importantly, research on the economic, social,
and psychological risk and protective factors for recruitment to terrorism have
largely been limited to a small set of socio-demographic factors (Stern 2016). With
respect to organized crime, the majority of the research has been qualitative, with
few quantitative studies. Even among the quantitative literature, the focus has primarily been on the prevalence, or costs of organized crime, and little attention has
been paid to the offenders themselves, let alone the individual-level risk factors for
recruitment to organized crime (Thompson 2019). While research has highlighted
that there are important similarities between organized crime and terrorism offenders, and with ordinary criminals, recent findings suggest that there may also be
important differences in the key risk factors that predict recruitment for both organized crime offenders and terrorism offenders (Blokland et al. 2019; Liem et al.
2018; Pyrooz et al. 2018). The lack of rigorous studies into recruitment to organized
crime (Levi and Maguire 2004) and terrorism (Lum, Kennedy and Shirley 2006)
means that policies are often not evidence-based, or may be based on theoretical
assumptions, or assumptions drawn from a relatively small number of case studies.
What are the factors that lead to recruitment to organized crime and terrorism,
and how are they similar or different? What role do situational factors play in
recruitment, as contrasted with social or psychological causes? What impacts do
responses of society to these phenomena have upon populations that are considered
high risk by social control agents? These were the key questions that we sought to
answer in the context of a large European Horizon 2020 research and innovation
funding program. In order to accomplish this, the research consortium included a
wide spectrum of partners from the EU, US, Switzerland, and Israel, as well as
representatives from key institutions, such as the UNODC and EUROPOL.
The “PROTON” (Modelling the Processes Leading to Organized Crime and
Terrorism) consortium was led by the TRANSCRIME Centre at Università Cattolica
del Sacro Cuore in Milan, Italy, and co-coordinated by the Institute of Criminology
at the Hebrew University of Jerusalem. In order to capitalize on the strengths of
each institute, TRANSCRIME led the organized crime track of the project, and
HUJI led the terrorism track. Each track consisted of a series of independent research
projects. Project PROTON placed a focus on conducting unique, original studies,
employing new and original datasets. Primarily, the studies were focussed on identifying the micro, meso, and macro level factors that increase the risk of recruitment
Introduction
5
to organized crime, and radicalization and recruitment to terrorism. From its conception, the individual research tasks, as well as the project overall, were designed
specifically to fill key gaps that were identified in the existing body of knowledge.
Our goal in this volume is to present key findings from the project that illuminate
our understanding of recruitment to organized crime and terrorism. As detailed
below, the papers included add substantive and significant knowledge to our understanding of these questions focusing on the economic, social, and psychological
factors that increase the likelihood of recruitment. Below, we first briefly review the
existing literature on recruitment to terrorism and organized crime, identifying key
gaps in the literature. We then turn to the specific contributions in the volume and
summarize how they have added to the knowledge base in this area. Finally, we
revisit the question of similarities and differences between factors influencing
recruitment based on the papers in the volume, and try to draw broader conclusions
about how this knowledge can inform societal responses to the problem of
recruitment.
Radicalization and Recruitment to Terrorism
Radicalization and recruitment to terrorism are two separate but interrelated outcomes. Radicalization generally refers to the development of attitudes, beliefs, and
ideas that justify the use of radical violence to promote change, and thereby which
could lead to radical violence. On the other hand, recruitment is when an individual
has been solicited, or convinced, to carry out illegal activities that fall under the
category or legal definition of terrorism.2 As such, radicalization generally underpins recruitment, or is at least a near universal precursor to it. Nevertheless, only a
very small percentage of radicalized individuals will ever turn to terrorism
(McCauley and Moskalenko 2017; Neumann 2013). A key goal of radicalization
research is therefore to identify what differentiates non-violent from violent radicals
(LaFree and Freilich 2016).
Many scholars now believe that there must be certain risk factors that explain
why some members of an aggrieved group are led to justify radical violence, while
the majority do not. It also must be that certain risk factors could explain why a
small proportion of radicals go on to engage in terrorism offending, whilst most do
not (Armstrong et al. 2019; Haddad 2017; Sarma 2017; Stern 2016). The best methods for identifying which factors may be the most important for explaining these
different outcomes is to compare radicals with non-radicals, and violent radicals
with non-violent radicals (Knight, Woodward and Lancaster 2017; LaFree and
Frelich 2016). Unfortunately, to date, few studies have taken this approach. The
These definitions are according to those of the European Commission’s strategy for combating
radicalisation and recruitment (2005, 2014). While there is an extensive literature surrounding
the debate over these definitions, the EU definitions are sufficiently broad so as to encapsulate the
primary elements of the phenomena being discussed.
2
6
D. Weisburd et al.
relatively young literature on radicalization is still made up of primarily theoretical,
or qualitative study, with quantitative study representing only a small proportion of
the body of knowledge (Neumann and Kleinmann 2013). While the literature has
identified a range of factors that appear to be correlated with radicalization o­ utcomes,
the evidence remains quite mixed, and certain factors have been given more attention than others (Allan et al. 2015; Bondokji, Wilkinson and Aghabi 2017).
For example, one of the most commonly discussed factors is socio-economic
status. Whilst many believed, and still believe, that poor economic conditions
increase the risk of radicalization and recruitment to terrorism, most studies have
found non-significant or at best weak relationships between individual socio-­
economic status and radicalization outcomes. Similarly, with regards to education,
the evidence is quite mixed. While some studies have identified lower education as
a risk factor, others point to a high prevalence of higher education among recruited
terrorism offenders, and the university campus as a hot-spot of recruitment (Allan
et al. 2015; Bondokji, Wilkinson and Aghabi 2017; Victoroff 2005). Other related
factors, such as unemployment, underemployment, recent job loss or employment
instability, do appear to have more consistent effects. Whilst objective socio-economic status may not be as important as some believe, subjective forms of deprivation, such as collective and individual relative deprivation, which includes elements
of perceived group-based discrimination, have been found to be strong predictors of
radicalization.
The findings concerning subjective beliefs and perceptions are perhaps even
more interesting if contextualized as socio-psychological factors. The study of psychological factors has undergone a pendulum swing since radicalization became a
topic of interest to researchers. While early terrorism scholars often assumed that
terrorists must be ‘mad men’, a growing body of evidence found that the only psychological constant among terror recruits was an overwhelming normality
(Kruglanski and Golec 2004; Merari 2004; Horgan 2005; Gill 2012). As this became
the prevailing wisdom, the study of psychological factors became scarce (Victoroff
2005; Victoroff, Adelman and Matthews 2012; Stern 2016). Yet in recent years a
new focus has been placed on the role of mental-illness more broadly, and psychological and personality traits in particular (Gill and Corner 2017). While these factors are well known to criminologists and strong predictors of a range of criminal
attitudes and behaviors, the number of studies that examine these types of factors
with respect to radicalization and recruitment to terrorism is still small.
Recruitment to Organized Crime
The emergence of criminal organizations has been explained as being driven by a
wide range of factors, including social, economic and psychological ones (see e.g.
Lyman and Potter 2006). But scholars have generally argued that social factors
occupy the primary role in guiding the decision to become involved in an organized
crime (OC) network. Indeed, OC has particular characteristics that differentiate it
Introduction
7
from high-volume crime: in OC, social relations are more important; there is a
transnational dimension; the activities are more complex and they require several
co-offenders and specific expertise (Cornish and Clarke 2002; Kleemans and de
Poot 2008). Relations with co-offenders are important, but not always sufficient,
because these offenders may not possess the necessary capabilities. Contacts with
the legal world are also important for activities of this kind. Many people lack these
contacts and expertise, and some acquire them only later in life, e.g. through their
professional activities and contacts.
Kleemans and van Koppen (2014) identified three key aspects guiding the choice
of involvement in OC. Firstly, besides the presence of career criminals in the world
of OC, researchers have pointed to the presence of a group of ‘late onset’ offenders.
This finding is robust across several different criminal activities (drugs, fraud, and
other activities) and different roles in criminal groups (leaders, coordinators, and
lower-level suspects). This presence contradicts the general ideas that crimes in
adolescence precede crimes at a later age, and that individuals’ characteristics and
long-term risk factors are the main explanations of a life in crime. Secondly, various
involvement mechanisms play a role in OC. Besides deliberate recruitment, four
other involvement mechanisms are important: social ties and the ‘social snowball
effect’, work ties, leisure activities and sidelines, and life events (including financial
setbacks). Thirdly, work relations and work settings may be the breeding grounds of
OC activities, particularly for cross-border crimes.
Economic factors have generally received less attention. However, the recent
literature (see Lavezzi 2008; 2014, and the references therein) has identified three
economic factors determining the evolution of OC. Firstly, the structure of the economy can provide a favorable environment for typical OC activities, such as extortion and protection. Lavezzi (2008), who draws insights from Schelling (1971),
argues that Sicily is a prime example of a region plagued by the presence of OC, and
links OC to an economy characterized by a large proportion of small firms, large
sectors of traditional/low-tech economic activities, a large construction sector, and
a large public sector. Secondly, imperfections in the credit markets can create opportunities for usury, especially in the absence of the rule of law. Thirdly, the presence
of illegal and informal markets, where legal institutions cannot be invoked to establish rules, create opportunities for OC to provide an alternative rule of law and also
to act as a law enforcer.
Surprisingly, the economic literature has paid little attention to the role of
inequality. Only one study we know of examined the effects of poverty and deprivation, such as the emergence of inner city gangs (e.g. Lyman and Potter 2006). Yet
inequality can lead to the emergence of OC. Indeed, data from Italian regions show
that in the Southern regions, where criminal organizations are pervasive, income
inequality measured by the Gini index is relatively high. This phenomenon has deep
historical roots, which have been analyzed, for example, in terms of the role of land
ownership in the emergence of OC by Bandiera (2003).
Other factors, such as self-reinforcing mechanisms, may also impact on the
emergence of OC and may affect both inequality and social mobility. Social mobility is typically measured by intergenerational mobility, which quantifies the degree
8
D. Weisburd et al.
of fluidity between the parents’ socio-economic status and the offspring’s socio-­
economic status as adults. Wealthy members of society may reinforce their claims
to resources by utilizing OC and distorting the efficient allocation of physical and
human capital. As a result, the presence of OC may lead to less social mobility and
lower economic growth. Under certain conditions, the presence of OC may generate
poverty traps that prevent the children of low-income families from having any better opportunities than recruitment by the mafia.
As regards psychological factors, members of OC show not only a general predisposition to violence but also more complex cognitive and emotional traits determining their functional roles in OC networks. Nevertheless, few studies have used
neuroscientific tools to identify the principal psychological and cognitive determinants of the complex criminal behaviors that characterize OC. Most studies use as
their tool of investigation only the Psychopathy Check List-Revised (Ostrosky et al.
2011), a controversial instrument with a number of limitations, the most important
being the diagnosis of psychopathy itself (Hare 1999; Edens 2006). Moreover, neuroscientific tools such as neuropsychological and genetic tests and even neuroimaging are widely used in courts to explain (and sometimes justify) criminal behaviors
(Jones et al. 2013). To advance understanding of the psychological determinants of
criminal behaviors in an innovative manner, it is necessary to adopt these new tools
as well, and thus move beyond the tools and models used by classic criminology
(Walsh and Beaver 2009).
The Studies
Our review of present knowledge about recruitment to terrorism and organized
crime suggest the scarcity of studies on key issues in this area of research. The
PROTON studies sought to fill many of the gaps in the literature. The purpose of
this effort in PROTON was to inform the development of simulation models for
testing different types of societal interventions to reduced recruitment. However,
these studies have produced important findings that advance the knowledge base in
this area. And that is the reason for our joining together these contributions in
this volume.
We begin in Part I focusing on the terrorism track of PROTON with systematic
reviews of the existing literature in the chapters “What is the State of the Quantitative
Literature on Risk Factors for Radicalization and Recruitment to Terrorism?” and
“Resilience Against Political and Religious Extremism, Radicalization, and Related
Violence: A Systematic Review of Studies on Protective Factors”. Systematic
reviews of research evidence are characterized by careful searches of the research
literature, including both published and unpublished studies, and researchers in our
case sought to draw general conclusions from work based on meta-analytic statistics (Lipsey and Wilson 2001; Petrosino, Boruch, Farrington, Sherman, and
Weisburd 2003; Weisburd, Farrington, and Gill 2017). In the first review, Wolfowicz,
Litmanovitz, Weisburd and Hasisi identify and describe the makeup of the quantita-
Introduction
9
tive literature on risk factors for radicalization and recruitment to terrorism. The
review identifies that there has been a significant uptick in publications in recent
years, with the majority of the 57 included studies published since 2016. Whilst the
majority of studies focus on Islamic radicalization, a number of studies have
­examined mixed samples, without focusing on any particular form of extremism.
The majority of studies examine radicalization of beliefs, most commonly by
assessing support or justification of different forms of terrorism. Only a small number of studies were identified which compare terrorists with control or comparison
groups of non-terrorists. The findings of the review were that while socio-demographic characteristics are the most commonly explored factors, they had relatively
small effect sizes. On the other hand, traditional criminogenic (e.g. criminal history,
unemployment, low self control, and differential associations) and criminotrophic
factors (e.g. general obedience to the law and strong social bonds) were found to
have the strongest correlations with radicalization and recruitment outcomes.
These findings are consistent with Lösel, Bender, Jugl, and King’s systematic
review on protective factors, which found important overlaps in the types of protective factors against radicalization and recruitment to terrorism with those known
from the literatures on delinquency and crime. The chapter details the evidence collected from 28 studies pertaining to 30 identified protective factors. While the number of studies and factors is somewhat small, the review found significant overlap
with the protective factors known for general resilience and desistance from ordinary crime, including: self-control, adherence to law, acceptance of police legitimacy, illness, non-deviant significant others, positive parenting behavior, good
school achievement, non-violent peers, contact to foreigners, and a basic attachment
to society.
The chapter: “Terrorist Recidivism in Israel: Rates, Patterns and Risk Factors”
looks at recidivism for terrorist offenders. The literature has pointed to this as a key
gap in the body of knowledge for over a decade, and yet little empirical research has
been conducted (Ahmed 2016; Veldhuis and Kessels 2013; Pluchinsky 2008;
Schuurman and Bakker 2016). This is primarily due to a lack of settings in which
sufficient base rates can provide for meaningful analysis. Given that in the coming
years many terrorist offenders in Europe are set to be released, the importance of
such study cannot be underestimated. Taking up this challenge, Carmel, Wolfowicz,
Hasisi and Weisburd examined recidivism to terrorism in Israel, as well as a number
of key factors that affect the likelihood of recidivism. Following the general trends
identified in criminology regarding the rates of recidivism to the same offence compared to overall recidivism, the study identified that the rate of recidivism to terrorism offending is about half of the general recidivism rate in Israel. Examining the
rates more in depth reveals that that recidivism rates were found to increase with
each additional incarceration. Older age at time of release and longer sentences
were both found to be correlated with a lower risk of recidivism.
In recent years there has been an increased interest in the potential for counter-­
terrorism policing policies to have unintended negative outcomes. Some have suggested that hard approaches to counter-terrorism policing, which target or single out
specific minority communities and members, can potentially even lead to a backlash
10
D. Weisburd et al.
effect and increase the risk of radicalization and recruitment to terrorism (Choudhury
and Fenwick 2011; den Boer 2015; Harcourt 2006; LaFree and Ackerman 2009).
Tankebe uses perspectives on procedural justice to provide a framework for understanding this dilemma in the chapter “Unintended Negative Outcomes of CounterTerrorism Policing: Procedural (In)Justice and Perceived Risk of Recruitment into
Terrorism”. He employs an experimental vignette design to examine how the nature
of counter-terrorism practices affect people’s perceptions of the risks of recruitment
into terrorism. A national representative sample of Muslims in the UK was randomly assigned to one of four experimental conditions showing (a) procedurally
just street stops, (b) procedurally unjust street stops, (c) procedurally just counter-­
terrorism raids, or (d) procedurally unjust counter-terrorism raids. After reading the
scenarios participants completed a short questionnaire on the likely effects of the
condition. Procedurally unjust street stops were deemed to cause increased risks of
radicalisation. However, there was no evidence that procedurally unjust counter-­
terrorism raids had similar unintended negative consequences.
One of the largest gaps in the literature relates to the lack of studies that compare
violent and non-violent extremists. Drawing on data from the PIRUS dataset,
Michael Jensen and colleagues examine the role of a number of key risk factors in
differentiating between these two groups in the chapter “The Link Between Prior
Criminal Record and Violent Political Extremism in the United States”. The study
finds that prior criminal history is the single strongest predictor of violent extremist
offending. Moreover, extremist offenders acting upon far right-wing ideologies are
more likely to have criminal histories than other extremists. The study also found
that juvenile criminal offending was a greater risk factor than adult criminal offending for later extremist offending.
In the chapter “Testing a Threat Model of Terrorism: A Multi-method Study
About Socio-Economic and Psychological Influences on Terrorism Involvement in
the Netherlands”, Frank Weerman and colleagues provide a mixed methods study to
investigate the role of socio-economic and psychological factors and processes
leading to involvement in terrorism. The study includes a qualitative component in
which the researchers compare interviews conducted in the Netherlands with four
detained terrorism offenders, and a number of ordinary criminal offenders and other
informants. The study’s quantitative component includes an analysis of socio-­
economic and socio-psychological factors for all terrorism offenders in the
Netherlands (N = 279). The study had two different control groups. One was a
sample of matched common criminals (N = 279), and the other a sample drawn
from the general population from official statistics (N = 6000). The study found that
compared to the general population, terrorism offenders were more likely to be first
or second generation immigrants, have criminal histories, and be unemployed or
recently experienced job loss.
Part II of this volume presents studies of recruitment to organized crime. As with
Part I on terrorism, Part II begins with a systematic review of the social, psychological, and economic factors relating to involvement and recruitment into organized
crime groups (OCGs), including mafias, drug trafficking organizations (DTOs),
gangs, and other criminal organizations. The review searched all possible relevant
studies indexed in selected databases and published in five languages (i.e. English,
Introduction
11
French, German, Italian, and Spanish), without limitations as to their year of publication or geographic origin. Starting from 48,731 potentially eligible records,
­integrated with experts’ suggestions, this systematic review includes 47 empirical
studies employing quantitative, qualitative, or mixed-methods approaches. The
findings show that social and economic factors are the most commonly reported
factors relating to recruitment into OCGs, while psychological factors are marginal.
Although factors are highly interrelated and shared across OCGs, their predominance varies across types of criminal organizations. For instance, individuals join
mafias and gangs attracted by strong group identity, whereas individuals enter DTOs
mainly for financial gain.
In the chapter “Socio-Economic Inequalities and Organized Crime: An
Empirical Analysis” Battisti and colleagues carry out a macro level study by
examining data spanning from 1985-2014. They investigate the relationship
between inequality and organized crime at the regional level, assessing the role of
social mobility in organized crime. The study found that higher levels of inequality are associated with greater organized crime development. The study also found
that lower socio-­economic mobility displays a robust association with organized
crime development.
Moving towards individual level factors, Savona and colleagues provide the first
analyses of the criminal careers of Italian Mafia members in the chapter “The
Criminal Careers of Italian Mafia Members”. The analysis is based on the unique
Proton Mafia Member dataset, provided by the Italian Ministry of Justice, with
information on all individuals who received a final conviction for mafia offences
since the 1980s. The PMM includes information on more than 11,000 individuals
and 182,000 offences. The study explores the criminal careers of mafia members
following a three-level approach, analyzing the macro, meso, and micro dimensions. At the macro level, Italian mafias’ members show different types of criminal
trajectories, with a significant portion of the sample exhibiting a late onset and late
persistence pattern. At the meso level, the four main types of mafias (the Sicilian
Cosa Nostra, the Neapolitan Camorra, the Calabrian ‘Ndrangheta, and the Apulian
mafias) report very similar traits although some distinctive patterns emerge. At the
micro level, there are differences in criminal careers between early- and lately
recruited members, with the former showing higher frequency of violent, volume
crime and the latter a more complex, white collar profile. A further exploration of
the PMM data shows an escalation in both the number and the seriousness of crimes
before joining the mafia, which subsequently stabilizes afterwards.
While previous studies have shown that criminal behaviour is associated with
antisocial, borderline, narcissistic, and other personality disorders (Butler et al.
2006; Fazel and Danesh 2002; Roberts and Coid 2010), these factors are rarely
assessed when it comes to organized crime offenders. Addressing this key gap in the
body of knowledge, Salvato and colleagues set out to investigate the psychological
profile of organized crime members in the chapter “Investigating the Psychological
Profile of Organized Crime Members”. They gave personality tests to 100 prisoners
(50 organized crime offenders and 50 common criminals) incarcerated in Italy. The
results showed that masochistic personality disorder was more likely to be found
among organized crime offenders than ordinary criminals.
12
D. Weisburd et al.
Moving to a different European context, Madarie and Kruisbergen explore organized crime in the Netherlands in the chapter “Traffickers in Transit: Analysing the
Logistics and Involvement Mechanisms of Organised Crime at Logistical Nodes in
the Netherlands”. The Netherlands functions as an important source and transit
country for international organised drug trafficking. This is in part due to its large
logistical nodes in the world economy, like the airport and the seaport. Although
knowledge on organised crime offenders engaging in transit crime has accumulated
recently, systematic analyses of offenders operating on logistical nodes are still rare.
Based on in-depth analyses of 16 cases of the Dutch Organised Crime Monitor, this
chapter explores how drug traffickers operate at logistical nodes, in particular airports. Furthermore, the occupational and social embeddedness of organised crime
activities and the personal motivations of drug traffickers to become and stay
involved are analysed. Although the main analyses focus on organised crime at airports (11 cases), organised crime at seaports (5 cases) is analysed as well in order to
compare the logistics and involvement mechanisms at the airport with those at the
seaport.
The results demonstrate that organised crime groups deploy mainly three types
of tactics to traffic drugs, namely defying, avoiding, and neutralising security
checks. Occupational embeddedness is manifested through several job-related factors. Autonomy, mobility, and the similarity between legitimate duties and criminal
activities facilitate discrete engagement in organised crime activities during work
time. Port employees are also attractive to organised crime groups because of their
job-related social capital and knowledge. Co-offenders are recruited through snowballing and are most often family members or former colleagues. Finally, social
bonds and money are both important in becoming and staying involved. Greed is
more often a reason to stay involved than a need for money. If members do want to
leave the group, threats of violence are not shunned.
In another study focussed on the Netherlands, Van der Geest and colleagues
explore the relationship between delinquent development, employment and income
in a large sample of Dutch organized crime offenders in the chapter “Delinquent
Development, Employment and Income in a Sample of Dutch Organized Crime
Offenders: Shape, Content, and Correlates of Delinquent Trajectories from Age 12
to 65”. The analyses provide an in depth exploration of offending and risk factors
over the life-course. The study found that on average, organized crime offenders’
peak offending occurred at ages slightly older than common criminals. The overwhelming majority of offenders had criminal histories preceding their first organized crime offence, and had multiple subsequent offences.
Overlap and Distinctive Patterns: What We Learned
As we noted at the outset PROTON not only sought to increase the knowledge base
about recruitment to terrorism and organized crime, it also sought to identify the
extent to which these areas of study would benefit from examination in the context
Introduction
13
of a single research program. Our chapter so far has documented the rich body of
new research our project has generated in both of these areas. We think that this is
the largest collection of essays focused on recruitment to organized crime and terrorism that has been published to date. And our studies provide important new
insights into the social, economic and psychological forces that lead to recruitment
to both terrorism of organized crime. But a key question we want to turn to before
concluding this introduction is whether this research encourages us to see recruitment as a general phenomenon for crime and terrorism research, or whether it suggests that little can be gained by their combination in a single area of study.
We want to emphasize again that the the studies in this volume reinforce what we
noted in our reviews of the literature to date. The study of risk factors for recruitment to terrorism and organized crime remains underdeveloped compared to similar
study pertaining to common criminality. Nonetheles, the studies included in this
volume provide important additions and contributions to the body of knowledge,
each exploring key topics through the use of a range of methods and unique samples.
A key conclusion of our project is that there is a substantial degree of overlap in
our findings across terrorism and organized crime. It is simply not right to say that
these areas of study are so distinct that each has little to inform in terms of the other.
In fact, the recruitment into both terrorist and organized crime groups is likely to
follow common pathways. Nor is it right to say that we can learn little from more
general studies of criminality and crime for understanding recruitment to organized
crime and terrorism. It is certainly the case that these crimes have important distinctions from each other and from common crimes. Nonetheless, the PROTON studies
show that factors relating to key criminological theoretical perspectives and empirical evidence pertaining to general criminality appear highly relevant for both organized crime and terrorism.
For example, socio-economic factors are key issues for understanding involvement in organized crime and in terrorism, as they are key factors in understanding
common crimes (Pratt and Cullen 2005). Nonetheless, it is important to point out
substantive differences that emerge from our studies. While socio-economic factors
are important for understanding recruitment to terrorism, objective economic deprivation appears to be less important for terrorism offenders than for common criminals. Rather, under-­employment and recent job-loss may be related to perceived
injustices, discrimination, and feelings of subjective deprivations and these feelings
are often key to understanding recruitment to terrorism. These differences highlight
the fact that while criminals and terrorists may arise from the same general pool of
the population, they differ in how economic factors influence their recruitment.
The studies also highlight the extent to which personality-trait related factors are
key for both organized crime recruitment and radicalization and recruitment to terrorism. Masochistic personality traits appear to be a risk factor for recruitment to
organized crime. Low self-control acts as an important risk factor for recruitment to
terrorism. These are interesting and important findings that suggest significant overlaps in recruitment. However, we want to emphasize again that the role of psychological factors remains under-researched, and this should be an area of significant
inquiry in future studies.
14
D. Weisburd et al.
Perhaps one of the most striking overlaps between terrorism and organized crime
recruitment is with respect to the role of criminal history for both organized crime
and terrorism offenders. The findings of the PROTON studies represent some of the
first explorations of this issue, and they suggest not only overlap between organized
crime and terrorism, but also that findings regarding common crime offenders are
relevant for understanding terrorism and organized crime.
The criminological literature has long found that prior criminality is one of the
strongest predictors of future offending, including repeat offending (recidivism),
across virtually every type of offence (e.g. Gendreau et al. 1996; Kyckelhahn and
Cooper 2017). Even in the case of white collar crime there is now strong evidence
of repeat offending (Weisburd et al. 2001; Benson and Simpson 2014). While the
radicalization literature has in recent years begun to focus on the role of prior criminality (e.g. Ljujic, van Prooijen and Weerman 2017; Rostami et al. 2018; Bakker
2006, 2011; Bakker and de Bont 2016; Weenink 2015; Basra and Neumann 2017;
van Leyenhorst and Andreas 2017; Boncio 2017; Heinke 2017; LaFree et al. 2018;
Smith 2018; Horgan et al. 2016), the evidence produced by the chapters in this volume shed new light on the extent of the issue. Prior criminality was found to be a
significant predictor for being a terrorism offender compared to the general population as well as non-violent extremists. It was also found to be a significant predictor
for recidivism to terrorism. Similarly, criminal expertise and criminal records were
found to be among the main factors for recruitment into organized crime.
Importantly, our studies also identified the importance of perceptions of legitimacy in preventing recruitment to terrorism. There is a growing body of literature in
criminology that focuses in on how police treat offenders and how that may have
strong influence on perceptions of police legitimacy (Mazerolle, Antrobus, Bennett
and Tyler 2013; Tyler 2017; for an opposing view see Nagin and Telep 2017).
Tankebe’s examination of perceived reactions to unjust police stops in the chapter
“Unintended Negative Outcomes of Counter-Terrorism Policing: Procedural (In)
Justice and Perceived Risk of Recruitment into Terrorism” shows that police behaviour can be a risk factor in recruitment to terrorism. This is an important finding, that
supports concerns about procedurally unjust police behaviour (Worden and
McLean 2017).
Our comments here suggest that the original motivating idea of PROTON was a
useful one for expanding knowledge of recruitment more generally. There are certainly differences that need to be recognized between organized crime and terrorism
recruitment. For example, the study of organized crime at air and sea ports described
in the chapter “Delinquent Development, Employment and Income in a Sample of
Dutch Organized Crime Offenders: Shape, Content, and Correlates of Delinquent
Trajectories from Age 12 to 65” emphasizes the difference between common crimes
and organized crime, and also points to distinctions with terrorism. But even here,
there are commonalities that are important. Recruitment for example, comes through
networks of friends or former workers. A failure to recognize such overlaps in our
understanding of these phenomena limits the development of serious academic
study. The examination of these problems in a single research program has allowed
Introduction
15
us to see the commonalities between these two types of criminal recruitment. We
think that this has enriched our research program, and its contributions to existing
knowledge.
Conclusions and Policy Recommendations
Our volume has added specific knowledge to the understanding of recruitment to
terrorism and organized crime. It also emphasizes as we noted in the previous section the extent to which core criminological ideas can be applied across these phenomena. Risk factors often overlap, despite some important distinctions, and the
mechanisms of recruitment are often similar. These studies suggest the importance
of key criminological perspectives for understanding recruitment to both organized
crime and terrorism, such as that of criminal careers (e.g. Kleemans and De Poot
2008; Horgan and Taylor 2011) and differential associations (e.g. Kleemans and van
de Bunt 1999; Reinares et al. 2017). Indeed, our volume highlights prior criminality,
and the role of social and work associations, as being important risk factors for
recruitment to both organized crime and terrorism.
These findings mean that in some sense traditional models of crime prevention
ought to be applicable and appropriate for dealing with both terrorism and organized crime. If we know that prior criminality is a strong predictor of involvement
in terrorism and recruitment it can point us to high risk populations and the importance of preventing radicalization in such populations. It can also point us to the
importance of prevention in prisons. At present, prevention programs generally
focus on reducing common crimes in the future. But the PROTON studies suggest
that prevention programs focusing on reducing radicalization or preventing involvement in organized crime should provide important foci for reducing recruitment.
Similarly, PROTON studies suggest the importance of socio-economic factors in
recruitment. Again, they identify specific populations where radicalization and
potential recruitment to organized crime are more common. But importantly they
also suggest how economic programs can be used to prevent recruitment. In the case
of terrorism, for example, it is clear that unemployment strongly increases risk of
recruitment. Accordingly, employment programs focused on individuals of high
risk for radicalization would seem to be an important potential prevention approach
for policy makers.
Reducing radicalization in turn may require better training of the police.
Reducing police activities that are perceived as unjust appears to be a salient
approach for reducing radicalization. In turn, interruption of social networks that
support organized crime recruitment would seem particularly important for reducing recruitment.
For the most part our studies have focused on the risk or protective factors that
increase or decrease recruitment, or the mechanisms behind recruitment. In this
sense our studies do not provide a direct set of policy proscriptions for reducing
16
D. Weisburd et al.
recruitment to organized crime or terrorism. At the same time, our volume provides
new and important evidence about the recruitment process and risk and protective
factors that encourage and discourage recruitment. This knowledge, we believe,
should inform practitioners and policy makers as they seek to develop evidence
based and effective programs to reduce recruitment to organized crime or terrorism.
References
Ahmed, S. (2016). Is history repeating itself: sentencing young American muslims in the war on
terror. Yale LJ, 126, 1520.
Albanese, J. S. (2014). Organized crime in our times. Routledge. New York
Allan, H. G., Glazzard, A., Jesperson, S. T., & Sneha Reddy Winterbotham, E. (2015). Drivers of
violent extremism: Hypotheses and literature review. London: Royal United Services Institute.
Armstrong, G., Derrick, D., Hienz, J., Ligon, G., & Southers, E. (2019). Characteristics of
Homegrown Violent Extremist Radicalization. Los Angeles: National Center for Risk and
Economic Analysis of Terrorism Events University of Southern California.
Aslam, F., Rafique, A., Salman, A., Kang, H. G., & Mohti, W. (2018). The impact of terrorism on
financial markets: Evidence from Asia. The Singapore Economic Review, 63(05), 1183–1204.
Basra, R., & Neumann, P. R. (2017). Crime as Jihad. CTC Sentinel, 10(9), 1–5.
Bassiouni, M. C. (1990). Effective national and international action against organized crime and
terrorist criminal activities. Emory International Law Review, 4, 9.
Benavides, A. D., Keyes, L. M., & Pulley, B. (2016). Understanding the recruitment methods and
socialization techniques of terror networks by comparing them to youth gangs: Similarities
and divergences. Countering Terrorist Recruitment in the Context of Armed Counter-Terrorism
Operations, 125, 40.
Benson, M. L., & Simpson, S. S. (2014). Understanding white-collar crime: An opportunity perspective. Routledge. New York.
Berrebi, C., & Klor, E. F. (2010). The impact of terrorism on the defence industry. Economica,
77(307), 518–543.
Bovenkerk, F., & Chakra, B. A. (2005). Terrorism and organized crime. Forum on Crime and
Society, 4, 3–16.
Blokland, A., Van Hout, L., van der Leest, W., & Soudijn, M. (2019). Not your average biker;
criminal careers of members of Dutch outlaw motorcycle gangs. Trends in Organized Crime,
22(1), 10–33.
Bakker, E. (2006). Jihadi terrorists in Europe: Their characteristics and the circumstances in which
they joined the jihad: An exploratory study. Netherlands Institute of International Relations
Clingendael.
Bakker, E. (2011). Characteristics of jihadi terrorists in Europe (2001–2009). In R. Coolsaet,
Jihadi Terrorism and the Radicalisation Challenge. European and American Experiences
(pp. 131–144). Aldershot: Ashgate.
Bakker, E., & de Bont, R. (2016). Belgian and Dutch jihadist foreign fighters (2012–2015):
Characteristics, motivations, and roles in the War in Syria and Iraq. Small Wars & Insurgencies,
27(5), 837–857.
Boncio, A. (2017). Italian Foreign terrorist fighters: a quantitative analysis of radicalization risk
factors. Count Terror Prev Radic Prot Cult Herit Role Human Factors Technol, 133, 40.
Bandiera, O. (2003). Land Reform, the Market for Protection, and the Origins of the Sicilian
Mafia: Theory and Evidence. Journal of Law, Economics, and Organization 19(1), 218–244.
Bondokji, N., Wilkinson, K., & Aghabi, L. (2017). Understanding Radicalisation: A Literature
Review of Models and Drivers. Ministry of Foreign Affairs of the Netherlands.
Introduction
17
Butler, T., Andrews, G., Allnutt, S., Sakashita, C., Smith, N. E., & Basson, J. (2006). Mental disorders in Australian prisoners: a comparison with a community sample. Australian & New
Zealand Journal of Psychiatry, 40(3), 272–276.
Calderoni, F. (2014). Mythical numbers and the proceeds of organised crime: Estimating mafia
proceeds in Italy. Global Crime, 15, 138–163.
Clarke, R. V. G., & Newman, G. R. (2006). Outsmarting the terrorists. Connecticut: Greenwood
Publishing Group.
Choudhury, T., & Fenwick, H. (2011). The impact of counter-terrorism measures on Muslim communities. International Review of Law, Computers & Technology, 25(3), 151–181.
Cornish, D. B., & Clarke, R. V. (2002). Analyzing organized crimes. Rational choice and criminal
behavior: Recent research and future challenges, 32, 41–63.
Decker, S. H., & Pyrooz, D. C. (2011). Gangs, terrorism, and radicalization. Journal of Strategic
Security, 4, 151–166.
Decker, S. H., & Pyrooz, D. C. (2014). Gangs: Another form of organized crime. In L. Paoli (Ed.),
The Oxford handbook of organized crime (pp. 270–287). Oxford: Oxford University Press.
Deflem, M. (2007). International police cooperation against terrorism: Interpol and Europol in
comparison. Understanding and Responding to Terrorism, 19, 17.
den Boer, M. (2015). Counter-Terrorism, Security and Intelligence in the EU: Governance
Challenges for Collection, Exchange and Analysis. Intelligence and National Security 30(2–3),
402–419.
Densley, J. A. (2012). Street gang recruitment: Signaling, screening, and selection. Social
Problems, 59(3), 301–321.
Desmond, E., & Hussain, N. (2017). Organized crime and terrorism. In J. D. Freilich & G. LaFree
(Eds.), The handbook of the criminology of terrorism (pp. 373–384). Hoboken: Wiley
Blackwell.
Dishman, C. (2001). Terrorism, crime, and transformation. Studies in Conflict & Terrorism, 24,
43–58.
Dishman, C. (2005). The leaderless Nexus: When crime and terror converge. Studies in Conflict &
Terrorism, 28, 237–252.
Dodd, V. (2019). Counter-terror chief says policing alone cannot beat extremism.
Retrieved from The Guardian: https://www.theguardian.com/uk-news/2019/aug/06/
counter-terrorism-chief-calls-for-greater-social-inclusion
Edens, J. F. (2006). Unresolved controversies concerning Psychopathy: Implications for clinical
and forensic decision making. Professional Psychology: Research and Practice 37(1), 59–65.
Fazel, S., & Danesh, J. (2002). Serious mental disorder in 23 000 prisoners: a systematic review of
62 surveys. The Lancet, 359(9306), 545–550.
Felbab-Brown, V. (2019). The crime-terror Nexus and its fallacies. In E. Chenoweth, R. English,
A. Gofas, & S. N. Kalyvas (Eds.), The Oxford handbook of terrorism (pp. 366–383). Oxford:
Oxford University Press.
Finelli, G. A. (2019). Slash, shoot, kill: Gang recruitment of children and the penalties gangs face.
Family Court Review, 57(2), 243–257.
Fleenor, P. (2003). Cigarette taxes, black markets, and crime. Policy Analysis, 468, 1–20.
Gendreau, P., Little, T., & Goggin, C. (1996). A meta-analysis of the predictors of adult offender
recidivism: What works! Criminology, 34(4), 575–608.
Gill, P. (2012). Terrorist violence and the contextual, facilitative and causal qualities of group-­
based behaviors. Aggression and Violent Behavior 17(6):565–574.
Gill, P., & Corner, E. (2017). There and back again: The study of mental disorder and terrorist
involvement. American Psychologist, 72(3):231.
Haddad, S. (2017). Accounting for Lebanese Muslims’ perspectives on the Islamic state (ISIS):
religious militancy, sectarianism and personal attributions. Defense & Security Analysis, 33(3),
242–262.
Hare, R. D. (1999). Psychopathy as a risk factor for violence. Psychiatric Quarterly, 70(3),
181–197.
18
D. Weisburd et al.
Hasisi, B., Perry, S., & Wolfowicz, M. (2019). Counter-terrorism effectiveness and human rights in
Israel. In International human rights and counter-terrorism (pp. 1–21).
Harcourt, B. E. (2006). Muslim Profiles Post-9/11: Is Racial Profiling an Effective Counterterrorist
Measure and Does it Violate the Right to Be Free from Discrimination?. U Chicago Law &
Economics, Olin Working Paper, (288).
Heinke, D. H. (2017). German foreign fighters in Syria and Iraq: The updated data and its implications. CTC Sentinel, 10(3), 17–22.
Horgan, J., Shortland, N., Abbasciano, S., & Walsh, S. (2016). Actions speak louder than words: A
behavioral analysis of 183 individuals convicted for terrorist offenses in the United States from
1995 to 2012. Journal of Forensic Sciences, 61(5), 1228–1237.
Horgan, J., & Taylor, M. (2011). Disengagement, de-radicalization, and the arc of terrorism:
Future directions for research. Jihadi terrorism and the radicalisation challenge: European and
American experiences, 173–186.
Horgan, J. (2005). The psychology of terrorism. London, England: Routledge.
Hutchinson, S., & O’malley, P. (2007). A crime–terror Nexus? Thinking on some of the links
between terrorism and criminality. Studies in Conflict & Terrorism, 30, 1095–1107.
Jones, O. D., Wagner, A. D., Faigman, D. L., & Raichle, M. E. (2013). Neuroscientists in court.
Nature Reviews Neuroscience, 14(10), 730–736.
Kleemans, E. R., Soudijn, M. R., & Weenink, A. W. (2013). Situational crime prevention and
cross-border crime. In Clarke, R. & Tilley, N. (Eds.) Situational prevention of organised crimes
(pp. 35–52). Willan: Portland.
Kleemans, E. R., & De Poot, C. J. (2008). Criminal careers in organized crime and social opportunity structure. European Journal of Criminology, 5(1), 69–98.
Kleemans, E. R., & Van de Bunt, H. G. (1999). The social embeddedness of organized crime.
Transnational Organized Crime, 5(1), 19–36.
Kleemans, E. R., & Van Koppen, M. V. (2014). Careers in organized crime. Encyclopedia of
Criminology and Criminal Justice 285–295.
Knight, S., Woodward, K., & Lancaster, G. L. (2017). Violent versus nonviolent actors: An empirical study of different types of extremism. Journal of Threat Assessment and Management,
4(4), 230.
Kruglanski, A., & Golec, A. (2004). Individual Motivations, The Group Process and Organizational
Strategies in Suicide Terrorism. In E. Milgrom, Suicide Missions and the Market for Martyrs, A
Multidisciplinary Approach. Princeton: Princeton University Press.
Kyckelhahn, T., & Cooper, T. (2017). The past predicts the future: Criminal history and recidivism
of federal offenders. Washington D.C.: United States Sentencing Commission.
LaFree, G., & Ackerman, G. (2009). The empirical study of terrorism: Social and legal research.
Annual Review of Law and Social Science, 5, 347–374.
LaFree, G., & Freilich, J. D. (Eds.). (2016). The handbook of the criminology of terrorism. John
Wiley & Sons.
LaFree, G., Jensen, M. A., James, P. A., & Safer‐Lichtenstein, A. (2018). Correlates of violent
political extremism in the United States. Criminology, 56(2), 233–268.
Lavezzi, A. M. (2008). Economic structure and vulnerability to organised crime: Evidence from
Sicily. Global Crime, 9, 198–220.
Lavezzi, A. M. (2014). Organised crime and the economy: A framework for policy prescriptions.
Global Crime, 15, 164–190.
Leith. (2002). Short-staffed Mafia makes a job offer you can’t refuse. Retrieved from The Daily
Telegraph: https://www.telegraph.co.uk/news/worldnews/northamerica/usa/1394814/Shortstaffed-Mafia-makes-a-job-offer-you-cant-refuse.html
Levi, M., & Maguire, M. (2004). Reducing and preventing organised crime: An evidence-based
critique. Crime, Law and Social Change, 41(5), 397–469.
Leukfeldt, E. R., & Kleemans, E. R. (2019). Cybercrime, money mules and situational crime
prevention: Recruitment, motives and involvement mechanisms. In Criminal networks and law
enforcement (pp. 75–89).
Introduction
19
Liem, M., van Buuren, J., de Roy van Zuijdewijn, J., Schönberger, H., & Bakker, E. (2018).
European lone actor terrorists versus “common” homicide offenders: An empirical analysis.
Homicide Studies, 22, 45–69.
Lipsey, M. W., & Wilson, D. B. (2001). Practical meta-analysis. SAGE publications, Inc.
Ljujic, V., van Prooijen, J. W., & Weerman, F. (2017). Beyond the crime-terror nexus: socio-­
economic status, violent crimes and terrorism. Journal of Criminological Research, Policy and
Practice, 3(3), 158–172.
Lum, C., Kennedy, L. W., & Sherley, A. (2006). Are counter-terrorism strategies effective? The
results of the Campbell systematic review on counter-terrorism evaluation research. Journal of
Experimental Criminology, 2(4), 489–516.
Lyman, M. D., & Potter, G. W. (2006). Organized crime (4th ed.). Upper Saddle River: Prentice
Hall.
Makarenko, T. (2004). The crime-terror continuum: tracing the interplay between transnational
organised crime and terrorism. Global Crime 6(1), 129–145.
Malik, O. F., Schat, A. C., Raziq, M. M., Shahzad, A., & Khan, M. (2018). Relationships between
perceived risk of terrorism, fear, and avoidance behaviors among Pakistani university students:
A multigroup study. Personality and Individual Differences, 124, 39–44.
Mazerolle, L., Antrobus, E., Bennett, S., & Tyler, T. R. (2013). Shaping citizen perceptions of
police legitimacy: A randomized field trial of procedural justice. Criminology, 51(1), 33–63.
McCauley, C., & Moskalenko, S. (2017). Understanding political radicalization: The two-­pyramids
model. American Psychologist, 72(3), 205.
Merari, A. (2004). Suicide terrorism. In R. I. Yufit, & D. Lester, Assessment, treatment, and prevention of suicidal behavior (pp. 431–454). Hoboken: John Wiley & Sons.
Mesch, G. S. (2000). Perceptions of risk, lifestyle activities, and fear of crime. Deviant Behavior,
21(1):47–62.
Mullins, S. (2009). Parallels between crime and terrorism: A social psychological perspective.
Studies in Conflict & Terrorism, 32(9), 811–830.
Nagin, D. S., & Telep, C. W. (2017). Response to “Procedural justice and policing: A rush to judgment?”. Annual review of Law and social Science, 13, 55–58.
Neumann, P. (2013). The trouble with radicalization. International Affairs 89(4), 873–893.
Neumann, P., & Kleinmann, S. (2013). How rigorous is radicalization research?. Democracy and
Security, 9(4), 360–382.
Ostrosky, F., Borja, K. C., Rebollar, C. R., & Galván, K. D. (2011). Neuropsychological profiles of members of organized crime and drug-traffic organizations, Research and Reports in
Forensic Medical Science, 2, 19–30.
Petrosino, A., Boruch, R. F., Farrington, D. P., Sherman, L. W., & Weisburd, D. (2003). Toward
evidence-­
based criminology and criminal justice: Systematic reviews, the Campbell
Collaboration, and the Crime and Justice Group. International Journal of Comparative
Criminology, 3(1), 42–61.
Pinotti, P. (2015). The economic costs of organised crime: Evidence from southern Italy. The
Economic Journal, 125, F203–F232.
Pluchinsky, D. A. (2008). Global jihadist recidivism: A red flag. Studies in Conflict & Terrorism,
31(3), 182–200.
Pratt, T. C., & Cullen, F. T. (2005). Assessing macro-level predictors and theories of crime: A
meta-analysis. Crime and Justice, 32, 373–450.
Pyrooz, D. C., LaFree, G., Decker, S. H., & James, P. A. (2018). Cut from the same cloth? A
comparative study of domestic extremists and gang members in the United States. Justice
Quarterly, 35, 1–32.
Rapoport, D. C. (1983). Fear and trembling: Terrorism in three religious traditions. American
Political Science Review, 78(3), 658–677.
Rapoport, D. C. (2004). The four waves of modern terrorism. In Attacking terrorism: Elements of
a grand strategy (pp. 46–73).
Reinares, F., Garcia-Calvo, C., & Vicente, A. (2017). Differential association explaining Jihadi
radicalization in Spain: A quantitative study. CTC Sentinel, 10(6), 29–34.
20
D. Weisburd et al.
Roberts, A. D., & Coid, J. W. (2010). Personality disorder and offending behaviour: Findings from
the national survey of male prisoners in England and Wales. The Journal of Forensic Psychiatry
& Psychology, 21(2), 221–237.
Rostami, A., Sturup, J., Mondani, H., Thevselius, P., Sarnecki, J., & Edling, C. (2018). The
Swedish Mujahideen: An exploratory study of 41 Swedish foreign fighters deceased in Iraq
and Syria. Studies in Conflict & Terrorism, 1–14.
Sageman, M. (2014). The Stagnation in Terrorism Research. Terrorism and Political Violence
26(4), 565–580.
Sarma, K. M. (2017). Risk assessment and the prevention of radicalization from nonviolence into
terrorism. American Psychologist 72(3), 278–288.
Savona, E. U., Riccardi, M., & Berlusconi, G. (Eds.). (2016). Organised crime in European businesses. London - New York: Routledge.
Savona, E. U., Kleiman, M. A. R., & Calderoni, F. (Eds.). (2017). Dual markets: Comparative
approaches to regulation. Springer.
Schelling, T. C. (1971). What is the business of organized crime?. The American Scholar, 643–652.
Schmid, A. P. (1996). The links between transnational organized crime and terrorist crimes.
Transnational Organized Crime, 2(4), 40–82.
Schmid, A. P. (2018). Revisiting the relationship between international terrorism and transnational organised crime 22 years later. Research Paper, The International Center for Counter-­
Terrorism, The Hague, 1–40.
Schuurman, B., & Bakker, E. (2016). Reintegrating jihadist extremists: evaluating a Dutch initiative, 2013–2014. Behavioral Sciences of Terrorism and Political Aggression, 8(1), 66–485.
Shaw, M., & Mahadevan, P. (2018). When terrorism and organized crime meet. Policy Perspectives,
6(7), 1–4.
Shelley, L. I. (1995). Transnational organized crime: An imminent threat to the nation-state?
Journal of International Affairs, 48, 463–489.
Smith, A. G. (2018). How radicalization to terrorism occurs in the United States: What research
sponsored by the National Institute of Justice tells us. US Department Of Justice, Office of
Justice Programs, National Institute of Justice.
Smith, R. G. (2014). Responding to organised crime through intervention in recruitment pathways.
Trends and Issues in Crime and Criminal Justice, 473, 1.
Stern, J. (2016). Radicalization to Extremism and Mobilization to Violence. The ANNALS of the
American Academy of Political and Social Science 668(1):102–117.
Taylor, M., & Horgan, J. (1999). Future developments of political terrorism in Europe. Terrorism
and Political Violence, 11(4), 83–93.
Thompson, N. (2019). ‘It’s a no-win scenario, either the police or the gang will get you’:
Young people and organised crime–vulnerable or criminal? Youth Justice. https://doi.
org/10.1177/1473225419843353.
Tyler, T. R. (2017). Can the police enhance their popular legitimacy through their conduct: Using
empirical research to inform law. University of Illinois Law Review, 2017, 1971.
Van Leyenhorst, M., & Andreas, A. (2017). Dutch Suspects of Terrorist Activity: A Study of Their
Biographical Backgrounds Based on Primary Sources. Journal for Deradicalization, (12),
309–344.
Veldhuis, T. M., & Kessels, E. J. (2013). Thinking before leaping: The need for more and structural
data analysis in detention and rehabilitation of extremist offenders. The Hague: International
Centre for Counter-Terrorism.
Victoroff, J. (2005). The mind of the terrorist: A review and critique of psychological approaches.
Journal of Conflict resolution, 49(1), 3–42.
Victoroff, J., Adelman, J. R., & Matthews, M. (2012). Psychological factors associated with support for suicide bombing in the Muslim diaspora. Political Psychology, 33(6), 791–809.
Vishnevetsky, M. (2009). Case study–youth gangs and terrorism in Chechnya: Recruitment, activities and networks. In The faces of terrorism: Multidisciplinary perspectives (pp. 151–168).
West Sussex: Wiley-Blackwell.
Introduction
21
Walsh, A., Beaver, K. M. (2009). Biosocial Criminology. In: Krohn M., Lizotte A., Hall G. (eds)
Handbook on Crime and Deviance. Handbooks of Sociology and Social Research. Springer,
New York, NY (pp. 79–101).
Weenink, A. W. (2015). Behavioral problems and disorders among radicals in police files.
Perspectives on Terrorism, 9(2), 17–33.
Weisburd, D., Farrington, D. P., & Gill, C. (2017). What works in crime prevention and rehabilitation: An assessment of systematic reviews. Criminology & Public Policy, 16(2), 415–449.
Weisburd, D., Waring, E., & Chayet, E. F. (2001). White-collar crime and criminal careers.
Cambridge: Cambridge University Press.
White, R. (1998). Curtailing youth: A critique of coercive crime prevention. Crime Prevention
Studies, 9, 117–137.
Williams, P. (1998). Terrorism and organized crime: Convergence, Nexus or transformation? FOA
Report on Terrorism, Stockholm, Defence Research Establishment, 69–92.
Wolfendale, J. (2007). Terrorism, security, and the threat of counterterrorism. Studies in Conflict
& Terrorism, 30(1), 75–92.
Worden, R. E., & McLean, S. J. (2017). Research on police legitimacy: The state of the art.
Policing: An International Journal, 40(3), 480–513.
Part I
Factors Affecting Radicalization and
Recruitment to Terrorism
What Is the State of the Quantitative
Literature on Risk Factors
for Radicalization and Recruitment
to Terrorism?
Michael Wolfowicz, Yael Litmanovitz, David Weisburd, and Badi Hasisi
Introduction
Terrorism research has become a field of increasing interest and importance over the
last few decades. Since the events of 9/11, the number of publications in the field
has increased exponentially. Despite the explosion in terrorism research, reviews of
the literature have consistently bemoaned the dearth of empirical evidence (Silke
2001, 2007, 2009; Sageman 2014). Among the most prominent explanations given
for the findings that as little as 3–5% of research is based on any form of empiricism, is the continued absence of definitional clarity and consensus. Scholars also
refer to the lack of original data, and a tendency for terrorism research to reuse the
same data sets many times over, as one of the primary limitations of the literature
(Schuurman and Eijkman 2013). Such criticisms were summarized in Sageman’s
(2014) infamous article on the ‘stagnation of terrorism research’.
However, others such as Schmid (2011) have had a more favorable and positive
view towards the state of the literature and have countered that the situation is one
that is much better than what others have painted. Indeed, it would seem that in
recent years the literature is heading in a more positive direction, with an increase
in the number of quantitative studies. According to Schuurman’s (2018) review of
3442 terrorism papers published between 2007–2016, 1.3% employed inferential
statistics and a further 5.8% used a combination of descriptive and inferential statistics. On top of this, 14.7% of studies employed descriptive statistics.
M. Wolfowicz · Y. Litmanovitz · B. Hasisi
Institute of Criminology, Faculty of Law, Hebrew University of Jerusalem, Jerusalem, Israel
e-mail: michael.wolfowicz@mail.huji.ac.il
D. Weisburd (*)
Institute of Criminology, Faculty of Law, Hebrew University of Jerusalem, Jerusalem, Israel
Department of Criminology, Law and Society, George Mason University,
Fairfax, Virginia, USA
© Springer Nature Switzerland AG 2020
D. Weisburd et al. (eds.), Understanding Recruitment to Organized Crime
and Terrorism, https://doi.org/10.1007/978-3-030-36639-1_2
25
26
M. Wolfowicz et al.
However, these reviews do little to inform us about the state of the literature on
the different sub-fields that make up the terrorism literature (Reid and Chen 2007).1
Radicalization, one such sub-field that has dominated much of the terrorism discourse in recent years, remains a relatively young topic and perspective (Neumann
2013; Neumann and Kleinmann 2013; Schmid 2013). While much has been said
about the broader terrorism literature, little is known about the state of the sub-­
literature on radicalization. Neumann and Kleinmann (2013) believe that the definitional issue has also inhibited the development of radicalization research. In their
review of the rigour of radicalization research, Neumann and Kleinmann (2013)
find that 74%of the studies used qualitative methodologies, mostly case studies and
narrative techniques, while 20% used quantitative methods. While only 26% of the
qualitative studies demonstrated a high level of methodological rigor, the authors
assessed that a whole 94% of the quantitative studies were of high methodological
rigor. As such, the state of the literature on radicalization appears to be somewhat
more positive relative to Schuurman’s (2018) findings on the broader terrorism literature. Moreover, it would seem that quantitative research on radicalization
accounts for a significant proportion of the terrorism literature’s quantitative
publications.
While a number of other systematic reviews have sought to explore radicalization as a specific subfield of terrorism research, these reviews have been overly
broad in their scope. Some reviews have even readily admitted that this approach
has impeded their ability to achieving their own stated objectives (Christmann
2012). While these review provide important contributions, they are unable to
answer specific questions, such as; What does the quantitative evidence say? What
are the risk factors for radicalization? These are core topics of importance to radicalization research, especially given the findings of a recent systematic review on
risk assessment tools which found them to be of generally poor quality and lacking
an evidentiary basis (Scarcella et al. 2016). Indeed, systematic reviews are meant to
address focussed and narrow research questions, unlike traditional reviews which
explore topic areas (Gough et al. 2012; Khan et al. 2003).
This review seeks to address some of the issues that have hindered previous ones
by in asking the specific and focussed research question of what are the risk factors
of different radicalization outcomes in democratic countries as derived from quantitative studies? In asking this question we also seek to detail the qualities and characteristics of the quantitative literature in order to draw comparisons with the
broader literature. In order to address this question and contribute to important gaps
in the body of knowledge, this chapter is split into three sections. First, we conduct
a review of prior reviews on radicalization and in doing so identify the primary limitations and methodological issues that characterize these studies. On this basis, the
second section outlines the theoretical basis for our systematic review’s methodolOther subfields include but are not limited to: counter-terrorism, counter/de-radicalization and
disengagement (Dalgaard-Nielsen 2018; Windisch et al. 2017), lone-wolf terrorism (Spaaij and
Hamm 2015), geography of terrorism (Farrell et al. 2019), cyber-terrorism (Ducol et al. 2016), and
foreign fighters (Hegghammer 2010).
1
What Is the State of the Quantitative Literature on Risk Factors for Radicalization…
27
ogy, specifically with respect to the selection of inclusion criteria. In the third section, we present the results from our systematic review of the quantitative literature
on radicalization. We discuss the characteristics of the identified literature, ­including
its quality and rigour, and identify the most commonly examined risk factors examined in this body of evidence.
A Review of Prior Reviews
While terrorism research has been conducted by academics since the 1960’s, it
never really developed into an independent field of science. Rather, scholars and
researchers from a wide array of fields have at times contributed to the study of terrorism. Over the years, terrorism research has gone through waves of popularity
across different disciplines, including but not limited to, political science, sociology, psychology, and history (Reid 1997). In more recent years, scholars from fields
such as psychology and criminology have increasingly devoted their attention to
terrorism research (Neumann and Kleinmann 2013; LaFree and Freilich 2016;
Kruglanski et al. 2009). It may even be the case that today, scholars from these disciplines dominate the field of terrorism research. Despite the multi-disciplinary
attention that terrorism has received as a topic of research, and the large volume of
publications produced in the wake of 9/11, reviews of the literature have consistently painted a bleak portrait of literature’s state.
The first review that sought to provide an overview of the state of the terrorism
literature was conducted by Schmid and Jongman (1983) who identified that the
terrorism literature was quite weak. A few years later they conducted an updated
review in which they stated that there were probably few other fields where so much
has been written on the basis of so little research (Schmid and Jongman 1988).
Almost a decade later, Reid (1997) reviewed over 1100 items published between
1960 and 1990 and found that the research overwhelmingly tended to examine
small insurgent groups. She also found that many studies simply re-categorized or
re-analyzed the same data or sets of terrorism incidents that prior studies had used.
Starting in 2001, Andrew Silke began to publish the first of several reviews of the
terrorism literature. Following Silke’s findings from 2001 he found that there was
little notable change in the quality and trajectory of the literature since Schmid and
Jongman. In 2004, Silke found that only 3% of terrorism related studies used inferential statistics and only 15% used some form of descriptive statistics. In 2008 he
found more positive developments, with an increased use of descriptive and inferential statistics in publications which had grown exponentially since 2001. However,
he makes a caveat that compared to other fields the findings are still quite poor. and
only in 2001 was Andrew Silke’s review published. Silke has since published a
number of reviews, every few years. In his 2007 review examining whether the post
9/11 period had impacted the quality of the research.
While these reviews provided important overviews of the literature, they still
were unable to deal with synthesizing the evidence. As Ranstorp (2006) noted, “the
28
M. Wolfowicz et al.
relative absence of any reflective state-of-the-art reviews of what the field has
achieved” (p.3), represents a gap in the current knowledge. However, starting with
Lum et al. (2006) systematic review of the effectiveness of counter-terrorism
strategies, a few systematic reviews have been published over the years.
­
Unfortunately, with the exception of this review, which also found a very small
proportion of the literature to be empirically based, let alone quantitative, most studies can only be characterized as being narrative reviews. While this could simply a
reflection of the nature of the literatures being examined, it may also be related to
the methodologies used by the reviewers, especially related to the development of
research questions.
Taking a broad approach to the development of systematic review research questions has been a characteristic of reviews related to radicalization. For example,
Christmann (2012) examined the topic of Preventing religious radicalization and
violent extremism. In the section on individual risk factors (pp. 31–34), the author is
only able to provide a narrative review of the evidence contained in the two dozen
or so studies included in this part of the review. The author notes the inconsistencies
and great heterogeneity identified in the studies. The author does stress two important points here however. First, that no single factor can or will explain radicalization, rather, it is the combined and cumulative effect of risk factors that increases the
likelihood of radicalization. Secondly, risk factors are most relevant to creating the
initial openings to radicalization which increase the likelihood than an individual
will come into contact with other radicalizing agents. These radicalizing agents he
believes, become more important in the subsequent stages of radicalization leading
to violent extremism.
This view is shared by the authors of another review on the same topic which was
carried out on behalf of the International Centre for the Prevention of Crime (ICPC)
by Madriaza and Ponsot (2015). Entitled “Preventing radicalization: A systematic
review”, the authors explain that the main idea behind the prevention of radicalization is that: “the social prevention of radicalization aims to limit the development of
risk factors and strengthen factors that protect against such a process.” (p. 8). The
review includes 483 items but little information is given as to how they were
selected. The authors note that their inclusion criteria limited itself to items published between 1 January 2005 and 1 June 2015 in either English or French.
However, certain items which the authors considered to be of great importance and
which fell outside of these criteria (e.g. Sageman 2004) were included. The authors
state that they used the following working definition of radicalization to lead their
inclusion criteria: “radicalization leading to violence”: [translation] “the process
whereby an individual or group adopts a violent form of action, directly related to a
politically, socially or religiously motivated extremist ideology that challenges the
established political, social or cultural order” (Khosrokhavar 2014, pp. 8–9).
However, it is not clear if this means that only studies whose dependent variables
met this definition were included or if it was used more broadly as criteria for inclusion by topic.
In section “A Review of Prior Reviews” of this review (pp. 27–44), the authors
delve into the factors of radicalization identified. While Internet use, propaganda,
What Is the State of the Quantitative Literature on Risk Factors for Radicalization…
29
and prison radicalization are discussed in isolation, the remaining 32 factors are
split up into vote-counting matrices where they are divided between Islamic and
right-wing radicalization and coded as either having consensus support or being
characterized by either insufficient or contradictory evidence. The first matrix lists
14 individual-level factors: Socioeconomic level, Employment, Education, Criminal
behaviour, Personal crisis, Age (being young), Gender (men), Negative experiences,
Military training, National identity (exclusion and xenophobia), Nationals/immigrants, Search for identity, Religion, and Mental health. Another 7 factors are presented in a separate matrix on relational/group based factors: Internal group
cohesion, Family, Charismatic leaders, Relationship with other adults, Personal networks, Resources, and Intergenerational transmission of radical ideas. Another 3
factors are examined as community related factors: Isolated community, Cultural
conflicts, and Radicalization subculture. Lastly, 8 factors are listed under the heading of ‘macro and exo-systemic factors‘: Traditional gender identity, Weak or unstable nations, Fast-paced modernization, Other macro-political factors, Cultural
heterogeneity, Social integration, Conflicts in Muslim countries, Authoritarian societies. For the Islamic group, half of the factors were found to be characterized by
insufficient or contradictory evidence, and 65% for right-wing radicalization.
Another review by McGilloway et al. (2015) set out to identify and synthesize
empirical studies only. This review included 17 papers, the majority of which were
qualitative (N = 13). The review identified a limited number of factors: Identity,
deprived neighborhood, discriminatory counter-radicalization polices (integration
and socio-economic approaches), socio-economic status, gender, age, citizenship,
convert to Islam, mental health, stressful life events, social contacts, racial discrimination, grievances over foreign policy, ideology, in-group superiority/ criticism.
Among these 15 factors, the evidence was presented as being quite mixed. The
authors summarize that the only consistent finding was that young, relatively well
integrated males are at the greatest risk for radicalization. Overall, the authors
remind us that: “Many theories are available, yet empirical research is lacking” (p.49).
Another review, published under the auspices of the UK’s Home Office, and carried out by Munton et al. (2011), was a scoping review on Understanding vulnerability and resilience in individuals to the influence of Al Qaida violent extremism.
One of the advantages of this review’s approach is that it’s title indicates that it is
examining a very specific research question, which is what systematic reviews
ought to do. Unfortunately, the review digresses somewhat from its focus, examining as a secondary research question, “What factors enable vulnerable individuals to
resist the influence of AQ-influenced violent extremism?”. While this is certainly
related to the primary research question, it can be seen as a different topic. Following
this, the review includes secondary findings from another review on “other types of
violent activity“. While the focus on “other (non-AQ-influenced) types of terror
activity” is still closely related to the topic and outcome of interest, it also includes
more distantly related phenomena such as; animal rights activism, cults, gangs, and
youth crime. That the review finds a lack of empirical evidence, and acknowledges
the difficulties in synthesizing the findings, may have been impacted by other meth-
30
M. Wolfowicz et al.
odological decisions, such as the review’s inclusion of disparate contexts, from
Western countries to Chechneya and Palestinian terrorists. The primary review consisted of 39 included studies using a variety of methodologies: controlled trials
(N = 2), interviews (N = 15), survey interview (N = 5), observational study (N = 1),
and secondary analysis of autobiographies or biographies, extremist pamphlets and
other communications (N = 16). The authors categorized the factors identified in
these studies into 13 categories, some of which covered multiple factors (e.g. age,
sex and marital status were grouped together), while others examined individual
factors (e.g. religious beliefs). The limited number of factors identified in this review
provided little innovation or new knowledge.
Focusing on the “subfield of research” of the ‘root causes’ of non-suicide terrorism, Campana and Lapointe’s (2012) review included 48 studies published between
2000 and 2009. While this review also appeared to have a more focussed scope and
research question, the researchers identified that the included studies could be
divided into four categories based on their dependent variables: (1) the number of
terrorist attacks in a country (or countries), (2) the number of foreign/transnational
terrorist attacks, (3) the number of terrorist groups operating in a country (or countries), and (4) structural factors explaining individual participation in terrorism
groups. Due to the difficulties in classifying and categorizing the independent variables, the researchers used a vote counting method to arrange the factors across
these four outcomes. With respect to the fourth dependent variable, and relevant to
the study of risk factors of radicalization, the researchers found evidence for: political freedom, civil liberties, state repression, macro socio-economic conditions,
macro-economic inequalities, individual poverty, individual-level education.
However, as reflected by the first three constructs of these dependent variables, little
can be learned about radicalization from them. Also, as the researchers bemoan, the
disparate nature of these dependent variables leads to an inability to synthesize the
evidence in a more coherent or useful way. Even this study, which presented a much
more focussed research question than the others mentioned above, suffered from the
lack of well defined inclusion criteria regarding which outcomes of interest it would
be limited to.
With regards to radicalization, while there are certainly many different conceptions of what it constitutes (Neumann and Kleinmann 2013), comparing ‘apples and
oranges’ is problematic in systematic review research. While this term generally
refers more to the quality of studies included in a meta-analysis, it is also important
that any systematic review limits itself to examining the same outcome or dependent
variable. In all of the above noted examples, the lack of a well-defined and narrow
inclusion criteria regarding the outcome of interest led to the comparing of studies
whose dependent variables were starkly different. For example, the review included
and compared studies which assessed radicalization based on ‘support for
terrorism‘(Tausch et al. 2009), ‘opposition to the West’ (McCauley 2012), and
Muslims perceptions of the ‘war on terrorism’ (McCauley and Scheckter 2008).
While acknowledging the pitfalls of a broad research question and inclusion criteria, Christmann (2012) takes such an approach anyhow. In taking such an approach,
What Is the State of the Quantitative Literature on Risk Factors for Radicalization…
31
these studies fall short of systematic review standards, which include the need of
asking focused, specific questions, and developing narrow and limiting inclusion
criteria. Sometimes taking a broader approach and trying to include everything
leads to us knowing less. As Schmid and Jongman (1988) noted three decades ago,
terrorism research exceeds every other field in having so much written about the
topic on the basis of such little empiricism.
imiting Inclusion Criteria in Radicalization Research
L
Synthesis
While achieving definitional consensus ought to be an objective of the field of radicalization research, it is not necessary to reach such a consensus in order to move
the field forward (Neumann and Kleinmann 2013). Individual studies each choose
their own operational definitions and the results of these studies either support or
detract from the validity of the conceptualization and operationalization. While
there is wide ranging support for the notion that ‘support for terrorism’ is an outcome which represents radicalization well, other outcomes, even if framed as proxies for radicalization, seem more distantly related, even if they satisfy some
definitions of radicalization, radicalism, and extremism.
For example, Sedgwick's (2010) conception of radicalization includes the opposition to western, democratic values, which follows early conceptions of political
radicalism as developed in the field of political science and the study of social
movements. As such, studies who frame their analyses of radicalization by exploring opposition to the West (McCauley 2012) may satisfy this definition of radicalization. However, other proxies for this approach to radicalization, such as voting
for populist parties, and authoritarian personality are arguably more problematic
and more difficult to justify. As Mudde (2004) has previously explained, the suggestion that populist parties or their voters oppose western or democratic values is
highly subjective. In fact, these parties and their supporters often run on platforms
in which they claim to be the vanguards of such values. With respect to the use of
right-wing authoritarian personality (RWA) or fundamentalism as proxies for radicalism, Koopmans (2015) believes that these make for poor proxies since they lack
reference to the actual use of violence. Moreover, these personality traits are not
“negative” in the same way that the type of radicalization we are usually referring
to is. While these personality traits may be risk factors for radicalization, they are
not good proxies for it (Stankov et al. 2018; McCleary et al. 2011; Koopmans 2015).
While examining conceptions of radicalization such as opposition to democracy are certainly an important part of the conversation on radicalization, at its
core, radicalization is the process of the development of the ideas, beliefs, or
opinions which could lead to acts of radical violence, including terrorism
(Neumann and Kleinmann 2013; EU 2014). But what types of beliefs should we
be focusing on remain ill-­defined. As Christmann (2012) notes in his systematic
32
M. Wolfowicz et al.
review, “Where the research question is broad-ranging or where the key terms are
vague or ill-defined, the ability of a systematic review to produce a convincing
answer is reduced”. Since “the ‘process of radicalisation’ remains ill-defined”, it
is difficult to collate, summarize, and synthesize the evidence according to established standards of systematic reviews.
While radicalization may be ill-defined, social-psychological theories that examine the attitudinal or cognitive antecedents of behaviors tell us that the level of
specificity is what determines which attitudes should be used as proxies for the
outcome of interest. On this basis, Moskalenko and McCauley (2009) cite the
Theory of Planned Behavior model in their work that developed into the Two-­
Pyramid of Radicalization’s cognitive radicalization outcomes (McCauley and
Moskalenko 2017). The Theory of Planned Behavior model is based on (1) attitudes, (2) intentions, and (3) behaviors. According to the model, attitudes lead to
intentions which in turn lead to behaviors. However, in order for an attitude to have
satisfactory level of predictive quality, it must meet a high level of specificity with
reference to the behavioral outcome of interest. Indeed, the Two-Pyramid Model’s
cognitive radicalization outcomes are: Support for terrorism, justification of terrorism, and a belief in a personal moral obligation to participate in terrorism. The first
two outcomes are attitudinal antecedents closely related to the behavioral outcome
of interest, whereas the third is the intentional dimension.
As has been pointed out in the literature, radical attitudes rarely lead to radical behaviors. A very small minority of individuals who hold radical attitudes
will ever turn to violence. In addition, there are cases of terrorists who were not
overly radicalized. Failing to be able to explain these two observations has been
a primary criticism of popular radicalization models and theories. However,
when extending the Theory of Planned Behavior to criminal behaviors, Beck
and Ajzen (1991) explain that the cumulative and interactive weight of risk factors are what determine when attitudes will translate into behaviors. The absence
of risk factors, or the presence of protective factors, explains why many with
favorable attitudes, or even expressed intentions, will never engage in the undesirable behavior. Criminologists have already found good evidence to support
this theory in analyzing how and when criminal attitudes predict criminal
behaviors (Folk et al. 2018).
As such, this framework fits exceptionally well into the study of risk factors
for cognitive and behavioral outcomes of radicalization. For the purposes of this
review, we limit our focus to studies that achieve a satisfactory level of specificity and examine cognitive radicalization by assessing support for or justification
of violent extremism (attitudes), intentions to engage in violent extremism
(intentions), or actual involvement in violent extremism (behaviors). By limiting our inclusion criteria, we are not trying to create a situation in which we
impose our chosen definitions on others, or by which we seek to ignore or
underplay the existence of additional, alternative, or event competing frameworks. Rather, we seek to achieve the highest level of specificity and thereby
enable the collation of studies that are measuring the same thing, which enables
a synthesis of the same.
What Is the State of the Quantitative Literature on Risk Factors for Radicalization…
33
The Current Study
As noted above, previous studies’ decisions to include all research, or to include
even all types of empirical research, represent a methodological limitation that has
hindered their ability to identify and synthesize the evidence, as reflected in authors’
own statements and their results. Moreover, whereas previous reviews have generally been interested in radicalization in western countries, they include studies from
non-western countries. While studies from non-western countries can certainly provide important insights, the mixing of studies from such varied contexts is invariably a source of the heterogeneity that these prior reviews have identified. In this
study we limit our scope to the identification and synthesis of quantitative studies
that examine ‘risk factors’ (or predictors) of a well defined and highly specific conception of radicalization. We further limit our inclusion to only those studies whose
populations and contexts are in democratic, high-income countries since low and
high income countries are known to differ significantly and combining them introduces an additional level of heterogeneity. There is therefore good methodological
reason for systematic reviews to examine either high or low income countries separately (Shenderovich et al. 2016; Higginson et al. 2014, 2018; Murray et al. 2018).
This review therefore set out to assess the quality of this literature and identify
which factors have been examined using rigorous quantitative methods. As described
in the above literature review, while qualitative research is certainly important, it has
widely been surveyed and reviewed. While some reviews have focussed exclusively
on empirical studies, no study has focussed exclusively on the quantitative literature. This review sought to include studies which employed appropriate statistical
methods for isolating the effects of individual predictors that are associated with an
increased likelihood or risk that someone will either adhere to radical attitudes (cognitive radicalization), and/or engage in radical behaviors (behavioral radicalization).2
The inclusion and exclusion criteria were pre-determined in a review protocol that
was registered with the Campbell Collaboration and which included parameters
pertaining to each component of a study: population/ measurement of outcome
(dependent variable), outcomes, context of the study, and research design (sample
size, analytic strategy, level of analysis).
The first set of criteria applied to assessing whether studies met the inclusion
criteria related to the population of interest; individuals with radical attitudes, radical intentions, or radical behaviors. In order to identify risk factors for radical
behaviors, a sample of non-violent radicals (LaFree and Freilich 2016), or the non-­
violent general population is needed to serve as a suitable comparison group
(Berrebi 2007; Krueger 2008). Accordingly, for radical attitudes, a comparison
group made up of those without radical attitudes was needed (McCauley and
Moskalenko 2017; Moskalenko and McCauley 2009) in order to provide the type of
variation on the dependent variable which is needed in observational studies
(Higginson et al. 2014).
2
A description of the methods used in the included studies is provided below.
34
M. Wolfowicz et al.
The second set of criteria pertained primarily to ensuring that the dependent variable met the inclusion criteria and assessed on one of the three dependent variables
of interest: (1) Justification/support of radical violence, (2) Personal moral obligation/willingness/intentions towards radical violence, (3) Involvement in radical violence (including terrorism). As such, studies falling outside of this scope, such as
comparative studies of terrorist offenders with ordinary criminal offenders (e.g.
Lyons and Harbinson 1986; Liem et al. 2018), or different types of terrorists, such
as religious and right-wing (e.g. Smith and Morgan 1994) were excluded.
Additionally, studies examining macro-level predictors of terrorism events, number
of terrorism groups, or recruitment flows were excluded on this basis as well.
ontext: Separating Between Democratic and Non-democratic
C
Countries
Systematic reviews often separate between limit their focus to specific types of
countries. Differences in political, social, economic and cultural contexts, which are
known to effect factors of radicalization (Brockhoff et al. 2015; Zhirkov et al. 2014;
Enders and Hoover 2012), mean that there is good methodological justification for
focusing on particular types of countries (Shenderovich et al. 2016; Higginson et al.
2014; Murray et al. 2018). Since there is no established preference as to whether
reviews should separate by income or regime type, this review bridged both
approaches by limiting inclusion to democratic countries who are also OECD countries. As such, the Democracy Index was cross matched with the OECD countries,
resulting in the inclusion of all of the 36 OECD countries with the only exclusion
being Turkey.
Research Designs
Systematic reviews usually aspire to include mostly experimental or quasi-­
experimental studies, in order to synthesis findings from the top of the hierarchy of
evidence. Given that the literature is known to be bereft of randomized control trials
(Laycock 2012; Victoroff 2005), the review sought to include only high-quality
cross-sectional studies, and the rare longitudinal study or quasi-experiment. When
dealing with literatures of primarily observational studies, inclusion criteria need to
be adjusted in order to avoid to ensure the rigor of included studies and avoid combining high and low quality studies, thereby biasing results (Shenderovich et al.
2016; Murray et al. 2018). As such, inclusion was limited to cross-sectional studies
which included: (1) samples >N = 50, and (2) employed appropriate statistical analysis and controls; such as calculating either bivariate or multivariate correlations
(e.g. Pearson’s r or regression coefficients). For longitudinal and experimental or
What Is the State of the Quantitative Literature on Risk Factors for Radicalization…
35
quasi-experimental studies, smaller samples would be considered for where they
met the other criteria.
Outcomes
While this review focusses on studies examining individual-level risk factors, in
order to avoid bias, we excluded references to putative factors from the searches
(e.g. education, employment, collective relative deprivation etc.). This decision was
made to ensure that no pre-determinations would be made as to what the risk factors
of radicalization are, particularly those which are known to be popular in the literature, thereby allowing us to answer our first primary research question without bias
(Hammerstrøm et al. 2009; Shenderovich et al. 2016).
Search Strategy
After conducting multiple pilot searches and consulting with librarians and academics with expertise in systematic searches in social and behavioral sciences, the final
search terms, search strings, and databases were selected. Searches were performed
on: The Campbell Collaboration library, ISI Science, PsychINFO, PubMed, SSRN,
SCO, Sociological Abstracts, Bibsys, START and journals such as Journal of de-­
radicalization, and Perspectives on Terrorism.3 Additionally, we contacted a number of experts from the US, EU and Israel to seek out unpublished studies and limit
the effects of publication bias (Higgins and Green 2011).
Results
Our searches resulted in the retrieval of 10,449 items. After removal of duplicates
we were left with 7892 original items which were screened based on their titles and
abstracts. A total of 7487 items were deemed to not meet the inclusion criteria, primarily based on their topic evidently being outside the scope of the review. The
remaining 405 items went through a secondary screening which included a closer
reading of the paper’s methodology sections. This screening led to the removal of
253 items, again primarily based on the topic being outside the scope of the review.
The remaining 152 items were read in their entirety by the senior researchers who
identified 50 studies that met all of the pre-determined inclusion criteria. In a­ ddition,
While most non-English studies are indexed in English, supplementary searches were also conducted in German and Dutch. General searches were also conducted on the Google scholar and
search engine to try and identify grey literature.
3
36
M. Wolfowicz et al.
Fig. 1 Systematic search results
our project partners and other experts who we contacted provided additional studies, 3 of which met the inclusion criteria. As such the final inclusion consisted of 53
studies.
Publications by Year
The results of the systematic searches identified a relatively large number of studies
that met the inclusion criteria. Overall, the studies were published between 2007
and 2018, with the largest number of studies (N = 10) being published in 2016. Only
one year—2008—had a single publication. The trend in publications shows a clear
uptick in recent years. While 2017 had fewer studies (N = 7) than 2016, and only
What Is the State of the Quantitative Literature on Risk Factors for Radicalization…
37
12
10
8
6
4
2
0
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
Fig. 2 Publications by year
N = 6 studies were identified for 2018, it is possible that late 2018 publications,
some of which may not appear until 2019, will lead to an increased number (Fig. 2).
Some of the studies (N = 6) contain more than one individual study and as such
the total number of studies included from the 53 publications is 59.
The overall majority of the studies were found to have been published in English
although 4 German, 4 Dutch and 1 Spanish language study were identified as meeting the inclusion criteria. Of the German studies, two of them were written by the
same primary author (Dirk Baier). Among the Dutch studies, one study (Van den
Bos et al. 2009) used the same dataset that the same group of scholars would use in
a number of later English Publications (Doosje et al. 2012, 2013; Macdougall
et al. 2018).
Context
The majority of the studies focused on a European context. Of these studies, 33
focused on a specific country, whereas 4 focused on more than one country. The EU
country with the largest number of studies was the Netherlands which had 9 studies.
The second largest number of studies by country was for the UK which had 8 studies. Another 6 studies focused on Belgium, however these studies were all based on
the same original dataset. Another 4 studies focused on Germany, each employing
unique datasets. Another 2 studies focused on Poland, while Denmark, Spain,
Norway, and Switzerland were the focus of single studies each. Of the studies
­focusing on multiple countries, one study included all countries in the European
Values Survey (Fig. 3).
The next largest group of studies was from the US, with 9 studies. Another 2
studies focused on Israel, while 1 study was focused on Australia and another on
Canada. Two additional studies included samples from more than one region. One
of these included a sample of terrorists from multiple democratic countries, primarily from the EU and the US.
38
M. Wolfowicz et al.
Fig. 3 Number of studies
by region/country
1
1
2
2
8
39
Australia
Canada
Israel
Fig. 4 Number of studies
by ideology examined
Mixed
US
EU
6
17
30
Islam
Mixed
RWE
Populations
The largest proportion of the studies examined radical Islamic ideology as the focus
of the study (N = 30). However, a large number of studies (N = 17) examined mixed
samples (e.g. Muslim and non-Muslim, or RWE and Islamic, or mixed with no distinction). Another N = 7 studies examine RWE explicitly. One publication included
separate studies in which 1 examined single-issue separatist radicalization and this
is included among the 17 mixed studies (Fig. 4).
Authorship
The overwhelming majority of the studies identified had more than one author, with
only 9 studies having been published by a lone author. Among the studies published
by single authors, one was a thesis paper and another was a research paper. Among
the studies published by multiple authors, 31 displayed inter-institution cooperation, whereas 12 studies were published by authors from the same institution.
In terms of the fields from which authorship was derived, based on the primary
authorship the most frequent field was psychology, which had 14 studies. Among
these studies, 3 of them came from departments which were identified as being
What Is the State of the Quantitative Literature on Risk Factors for Radicalization…
39
Authorship by field
Terrorism/social sciences
Sociology
Social sciences
Public health
Psychology
Political science
Education/social sciences
Economics
Comunications
0
2
4
6
8
10
12
Fig. 5 Authorship by field
political psychology departments specifically. There were an additional 4 studies
from psychiatry. Among the remaining studies, 10 were from the field of criminology, and there were an additional two studies from departments listed as s­ ocial-­work/
criminology departments. A further 6 studies came from political science, 3 from
economics. There were a total of 5 studies from sociology, one of which was from
sociology/economics. Another two studies were from authors from the field of education, one of which being from a social sciences and education department, and a
further two studies from social-sciences. There were also two studies from the field
of public health. Lastly, there was a single study from a social-sciences/terrorism
department, a single study from law, and another single study from communications
(Fig. 5).
Dependent Variable
Overall, the majority of the studies examined cognitive radicalization in the form of
attitudes. Only 2 studies examined radical intentions as their sole dependent, while
another 10 studies examined radical intentions as a co-dependent variable with radical attitudes. Whilst some studies used more established instruments, such as the
Activism-Radicalism-Intentions-Scales (ARIS), or SyFor, the majority of studies
used dichotomous variables assessing support or justification for terrorism, specific
types of terrorism (e.g. suicide bombings), or radical violence4 (See Fig. 6).
Among the 12 studies that examined radical behaviors, 5 were based on self-­
reports of radical behaviors which can be characterized only as sub-terroristic radi-
Radical violence differed from justification of terrorism in that most studies referred to the use of
illegal violence to cause political or social change, or the use of illegal violence and actions to
protest government policies.
4
40
M. Wolfowicz et al.
16
14
12
10
8
6
4
2
0
Fig. 6 Distribution of dependent variables
cal violence, whereas the remainder examined terroristic radical behaviors. Of these
studies, 3 compared violent terrorists with non-violent terrorists, whereas 4 compared terrorists with a sample of the normative, general population.
Data Sources
A total of 74% of the included studies used original data, primarily derived from
surveys. Secondary data was used by 3 of these studies only for the purposes of
providing a comparison groups. Of the 12 studies that employed exclusively secondary data, 41% of them (N = 5) included data from different versions of the PEW
reports. Other secondary data sources included the European Values Surveys, of
which different sets were used in 2 studies, and the PIRUS database of US based
extremist offenders which was used in 2 studies. The remaining 3 studies used secondary data which was hereto unknown to the radicalization literature, namely; The
Zurich Project on the Social Development of Children and Youth survey, the Young
in Oslo survey, and the Ethnic Minority British Election Study (EMBES).
What Is the State of the Quantitative Literature on Risk Factors for Radicalization…
41
Methodologies
The average sample size for the studies was 3105.7, with the smallest sample being
from a longitudinal study with an N = 46 and the largest sample being from the
study of Berrebi (2007) comparing Palestinian terrorists to the general population,
with an N of 41,828. The combined N of the studies was 179,968, however, in
removing overlapping samples, the combined N was 172,727. Of studies examining
radical attitudes and intentions, the average sample size was 1843. For studies
examining radical behaviors, the average sample size was 5310 including the
Berrebi (2007) study and 2876 without.
The studies could be categorized as having used one of two primary methodologies; regression models and structural equation modelling (SEM). While SEM is a
type of two-stage regression model, the technique is distinct from traditional linear
models. With regards to the studies employing traditional regression models, a mix
of different approaches were taken, such as ordinary least square regressions, and
logistic regression, including traditional binomial models, as well as PROBIT models. The majority of the studies (85%) also provided bivariate estimates in the form
of correlation matrices and descriptive statistics.
Most Commonly Examined Factors
The most commonly examined factors were for the outcome of radical attitudes, for
which there were 52 factors, followed by radical behaviors, with 21 factors, and
radical intentions with 16 factors. With few exceptions, the factors identified for
radical intentions and radical behaviors were all included in the longer list of those
identified for radical attitudes. The primary difference was that radical attitudes
itself was a factor for radical intentions and behaviors as well. Table 1 includes
descriptions of the different factors identified.5
The most commonly examined factors were socio-demographic factors, with age
(N = 33) and gender (N = 32), education (N = 27), and socio-economic status
(N = 17)6 including the greatest number of effect sizes. Of all other factors, the
greatest number of effects were found for factors pertaining religious/national identity (N = 21), collective relative deprivation (N = 19), and combined, factors pertaining to law legitimacy and abidance.
Not included in this table are socio-demographic factors that do not require descriptions, such as;
age, gender, education, employment, socio-economic status, immigrant status, marital status, and
criminal history.
6
Effect sizes for socio-economic status were found only for radical attitudes.
5
42
M. Wolfowicz et al.
Table 1 Descriptions of identified factors
Factors
Adjusted personality disorder
(APD)
Aggression
Anger/hate
Example descriptions
DSM-IV personality disorders, Narcissistic Personality
Inventory
Buss-Perry Aggression Questionnaire (BPAQ-SF)
Angry, resentful, furious, or displeased with a given issue or
situation
Anxiety
General Anxiety Disorder Scale (GAD-7), Hopkins-25 scale
(HSCL-25)
Authoritarianism/
Submission to higher authority, aggression to out-groups, and
fundamentalism
adherence to traditionalism
Collective relative deprivation Feeling that in-group is deprived or discriminated against
relative to other groups
Coping skills
Ability to cope with conflict and negative encounters/situations
Depression
Patient Health Questionnaire (PHQ-9), Hopkins-25 scale
(HSCL-25),
Discrimination
Experienced personal discrimination based on identity
Experienced violence
Perpetrated or was a victim of violence involving strangers,
bullies, or parents
Group superiority
Believing that one’s in-group is better than other groups
Individual relative deprivation Feeling unfairly treated compared to others
Institutional trust
Confidence in institutions (e.g. police, parliament, courts, social
services etc.)
Integration
Attachment to/alienation from the society in which one lives
Law abidance
There is a duty to follow and abide by the law
Law legitimacy
Respect for the government/law/authorities
Legal cynicism
Believing that laws are made to be broken
Moral neutralizations
Justifications of deviant behaviors (e.g. drugs, violence etc.)
Parental involvement
Parents show interest, praise, and are aware of children’s’
whereabouts
Perceived injustice
Feeling that the individual or group is treated unjustly most of
the time
Personal strain
Loss of parents, loss of work, experienced traumatic event etc.
Personal trust
Believing that most people can be trusted
Police contact
Number of contacts respondents had with police in the previous
12-month period
Political efficacy
Having influence or being represented in the political sphere
Political grievance
Opposition to foreign intervention in the Middle East
Political participation
Participation in political party, organization, completing
surveys, petitions etc.
Political satisfaction
Satisfaction with current system of government
Radical attitudes
Support for or justification of radical violence
Realistic threat
Compared to in-group, an out-group has too much power and
influence
Religious/national identity
Strength of identity/affinity with religious/national group
Religiosity
Importance of religion in daily life and activities
(continued)
What Is the State of the Quantitative Literature on Risk Factors for Radicalization…
43
Table 1 (continued)
Factors
School bonding
Segregationist
Self-control
Similar peers
Symbolic threat
Thrill-seeking/risk-taking
Uncertainty
West Vs. Islam
Example descriptions
Enjoying going to school and/or studying, feeling an attachment
to school
Separation of people by ethnic group
Impulsivity, quick to anger
Proportion of friends of similar background
Out-groups consider themselves to be better than my in-group
Taking risks just for fun of it, without thinking of consequences,
even if dangerous
Anxiety or anticipation prior to confronting potentially harmful
events
The West is trying to attack/dominate Islam/Islamic countries
∗
These are general descriptions that we have created based on the different descriptions given in
the included studies. Factors are arranged in alphabetical order
Results from Meta-analysis
The results of a meta-analysis conducted in this study have already been published
in a technical report.7 As the below forest plots show, a wide range of pooled effect
sizes were identified for the factors associated with each of the three outcomes. With
regards to radical attitudes, the largest negative estimate was found for law abidance. For positive factors the largest estimate was highly similar peers, although
with the estimate falling below the level of statistical significance, the largest significant estimate was for authoritarian/fundamentalist personality. On the other
hand, the smallest, and sometimes statistically non-significant effects were found
for socio-demographic factors, such as socio-economic status (negative effects),
and being a second generation immigrant (positive effects) (See Figs. 7 and 8).
With regards to radical intentions, age had the largest of the negative estimates,
considerably larger than for radical attitudes, followed by out-group friendships.
For positive estimates, the largest was for correlation between radical attitudes and
radical intentions, followed by activism intentions (See Fig. 9). However, for both
radical attitudes and radical intentions, similar factors were found to have estimates
that clustered together at the upper end of the rank-order, such as symbolic and
realistic threat. Additionally, the relatively large estimates found for in-group superiority and connectedness can be juxtaposed with the negative estimate for out-­
group friendships as an indication of the relative magnitudes of these related risk
and protective factors.
Similarly, for radical behaviors, the largest negative estimates were similar to
those for radical attitudes, namely law obedience and legitimacy. With regards to
positive effects, the largest estimate was found for radical attitudes, as was the case
for the outcome of radical intentions. Additionally, similar to factors identified for
7
The technical report is available on the PROTON website https://www.projectproton.eu.
44
M. Wolfowicz et al.
Anxiety (-.015 NS)
Politcial Participate (-.017 NS)
Education (Ord.) (-.027 NS)
Marital (-.045 NS)
SES (Ord) (-.048 NS)
SES (low) (-.065 NS)
Age (-.074**)
Female (-.095***)
General trust (-.109*)
Political Satisfaction (-.119 NS)
Inst. Trust (-.144*)
2nd gen immigrant (-.148*)
Education (high) (-.153*)
Depression (-.157†)
School bonding (-.201 NS)
School performance (-.256***)
Parental Involvement (-.303***)
High integration (-.355***)
Coping skills (-.36**)
Law abidance (-1.36***)
-1.8
-1.3
-0.8
-0.3
0.2
Fig. 7 Protective factors for radical attitudes
radical attitudes, for radical behaviors factors such as thrill-seeking/risk-taking
behavior, differential associations, low self-control, criminal history, and authoritarian/ fundamentalist personality figured prominently at the upper-end of the rank-­
order of positive estimates. The key difference between radical attitudes and radical
behaviors appears to be unemployment. The estimate for unemployment on radical
behaviors was almost triple the size as the estimate for radical attitudes (See Fig. 10).
Discussion and Conclusions
According to the findings of Schuurman’s (2018) review, 7.1% of terrorism studies
employ some form of inferential statistics. This finding indicated a significant uptick
in the rigour of the quantitative literature compared to earlier reviews. Neumann and
Kleinmann (2013), found that 20% of radicalization studies quantitative and rated
What Is the State of the Quantitative Literature on Risk Factors for Radicalization…
Political efficacy (.022 NS)
Uncertainty (.033 NS)
Worship attendance (.049 NS)
West Vs Islam (.08*)
Immigrant (.084**)
Welfare recepient (.108**)
Unemployment (.116*)
Religiosity (.145*)
Discrimination (.154**)
Political Grievance (.16**)
Prayer frequency (.172***)
Violent media Exp. (.175***)
Perceived injustice (.172***)
Violence exposure (.186***)
Male (.203***)
APD/Narcissism (.213 NS)
NSM posting (.219**)
Aggression (.226**)
SES (High) (.242 NS)
Relig/Nat identity (.258***)
Personal strains (.267***)
Anti Democratic (.275*)
Ind. Rel. Dep. (.285**)
Educ. Low (.313***)
Coll. Rel. Dep. (.332***)
Anger/Hate (.34 NS)
Low integration (.376***)
Deviant peers (.416***)
Legal cynicism (.423*)
Segregation (.459***)
Moral neutralization (.462*)
Law legitimacy (.554***)
Low Self Control (.588**)
Thrill/risk seeking (.624***)
Criminal History (.678**)
Symbolic threat (.688***)
Police Contact (.721***)
Realistic threat (.761***)
Group superiority (.847***)
Authoritarian/fundamentalism (.857***)
4 3 2 1
1 2 3
1 2 3 4 5 6 7 8 9
-0. -0. -0. -0. 0 0. 0. 0. 0. 0. 0. 0. 0. 0. 1 1. 1. 1.
Fig. 8 Risk factors for radical attitudes
45
46
M. Wolfowicz et al.
Age
Outgroup friends (-.202***)
Social Connectedness (-.43**)
Perceived injustice (.213***)
Ind. Rel. Dep. (.362*)
Collect. Rel. Dep. (.427***)
Relig/National identity (.499*)
In-group connect. (.554***)
Symbolic threat (.643 †)
Realistic threat (.703**)
Ingroup superiority (.805***)
Radical beliefs (1.112***)
-1.5
-1
-0.5
0
0.5
1
1.5
Fig. 9 Risk and protective factors for radical intentions/willingness
94% of these as being of high methodological rigor. Given that their study was made
up of 260 studies, this would mean that 52 studies included in their review were
quantitative. While Neumann and Kleinmann’s review was carried out prior to the
publication of many of the studies included in our review, the similar number of
included studies is intuitive. In focussing on radicalization studies on risk factors,
the current review identified that the quantitative research on risk factors may
account for a significant proportion of the quantitative radicalization research.
Most of the studies included in this review were of a fairly high quality in terms
of their methodologies and analytic strategies. We didn’t assess quality specifically
since our inclusion criteria already included provisions relating to appropriate statistical controls and sample size. As noted above, the studies included in this review
can be divided into two primary groups of methodologies; regression models and
SEM models. It is debatable as to whether SEM type approaches are to be considered more or less robust than traditional regression models. However, we found that
SEM models were more likely to be employed in small sample studies, in which
cases such an approach may be preferable. While studies employing SEM are less
likely to include key control variables (e.g. age, gender, etc.), Pauwels and Hardyns
(2018) present arguments against the routine inclusion of such variables in radicalization research. Indeed, in their study employing generalized linear models, they
What Is the State of the Quantitative Literature on Risk Factors for Radicalization…
47
Law Obedience (-.446***)
Legitimacy (-.334***)
Age (-.325*)
School Bonding (-.213***)
Marital status (-.169†)
Parental involve. (-.112***)
Education (Ord.)(.119 NS)
Abused (.135***)
Welfare recepient (.137**)
Poor integration (.21***)
Unemployed (.3**)
Immigrant (.301 NS)
Citizen (.345 NS)
Thrill/risk seeking (.357***)
Deviant peers (.362***)
Authoritarian/fundamentalist (.374***)
Criminal hist. (.391*)
Radical beliefs (.415***)
Low Self-control (.427***)
-1
-0.5
0
0.5
1
1.5
Fig. 10 Risk and protective factors for radical behaviors
do not include these variables even though their dataset, as used in previous studies,
included them. Nevertheless, most studies using regression models included such
variables and in some studies these were the primary variables of interest, especially
for studies examining risk factors for terrorists (Perliger et al. 2016; LaFree et al.
2018; Jasko et al. 2017; Berrebi 2007; Krueger 2008; Altunbas and Thornton 2011;
Ljujic et al. 2020).
The overwhelming majority of the quantitative radicalization research that has
been produced to date has come from Europe and/or focussed on European contexts. This could in part be due to the EU’s funding of projects. Of the European
studies included in this review, at least 12 are known to have received funding from
the EU. Sources of funding have long been noted to play an important role in directing the trajectories of terrorism research (Reid 1997; Neumann and Kleinmann
2013; Sageman 2014; Silke 2007).
Overall, the research is heavily geared towards examining cognitive radicalization in the form of radical attitudes. The most common approaches to examining
48
M. Wolfowicz et al.
radical attitudes have been through the adoption of dichotomous variables examining whether or not one supports or justifies terrorism, usually with reference to
suicide bombings or specific acts of terrorism. One of the findings that stands out
most about this portion of the literature is that while a number of studies using secondary data, such as the Pew report, the overwhelming majority of studies are based
on new, original data collected by the researchers. With regards to the studies examining radical intentions, all of them were based on new, original data. In all but one
case, studies examining radical intentions included a measure of radical attitudes as
well, generally in the form of assessing support for others’ involvement in radical
violence or terrorism.
Background characteristics and demographic factors were found to be the most
commonly examined risk factors, especially in studies examining terrorists specifically. However, as has previously been pointed out, with the exception of age and
gender, factors such as employment and education are characterized by mixed and
often contradictory evidence (Victoroff 2005). Stern (2016) has previously criticized the literature’s focus on such factors and its lack of attention to the types of
psychological, personality trait and attitudinal factors traditionally examined in
criminology. However, these types of factors figured prominently among the factors
identified in this review for their relationship to radical attitudes, radical intentions,
and even self-reported radical violence.
Madriaza and Ponsot’s (2015) review emphasized the importance of examining
protective factors and found that most studies preferred to examine risk factors over
protective factors. As Lösel et al. (2018) emphasize, protective factors are not simply the opposite or reverse of risk factors. For example, being employed is not necessarily a protective factor to the same degree to which being unemployed is a risk
factor. Such factors would need to be measured separately in order to identify their
individual effects. For example, while Doosje et al. (2012, 2013) examined societal
disconnectedness as a risk factor, Van Bergen et al. (2015, 2016) examined societal
connectedness as a protective factor. Only one of the studies included in this review
were framed as analyses of protective factors specifically. Feddes et al. (2015)
examined the impact of empathy and self-esteem building as protective factors
against radical attitudes and radical intentions. However, a large number of the studies included protective factors explicitly in their analyses, or otherwise found protective effects of the independent variables which they analyzed. This included
studies examining self-reported radical violence (e.g. Pauwels and Schils 2016;
Baier et al. 2016).
The results of the meta-analysis should therefore be taken in such a context. For
example, for radical attitudes, being a female had an estimate less than half of the
size for being a male. Similarly, with regards to socio-economic status (SES), low
SES had an estimate about half the size of high SES, although neither were statistically significant. With regards to education, the estimate for lower education was
almost double the size of the estimate for higher education. Measured on an ordinal
scale, the estimate for higher education was even smaller. Also for radical attitudes,
while high law legitimacy’s estimate was quite similar in size to the risk effect for
low legitimacy, the estimate for law abidance was considerably larger than the risk
What Is the State of the Quantitative Literature on Risk Factors for Radicalization…
49
effect for legal cynicism. For radical intentions, the estimate for in-group connectedness was considerably larger than for out-group friendships, while the estimate
for employment was somewhat larger than unemployment and the estimate for high
integration was considerably larger than that of low integration.
Taken together, these results show that traditional criminogenic and criminotrophic factors have the largest risk and protective estimates respectively. Factors such
as differential associations, criminal history, and low self-control, as well as factors
relating to social control dimensions, such as parental, peer and school bonds, and
normative values, were found to have estimates with the largest magnitudes.
Overall, the results of this review indicate that the quantitative literature on risk
factors for radicalization is a burgeoning field. Employing rigorous methodologies
and increasingly producing results based off of original data, the literature is also
moving towards the analysis of more psychological and personality trait related factors. The analysis of such factors, at present, has been limited to studies examining
the two components of cognitive radicalization; attitudes and intentions.
Unfortunately, there continues to be a lack of studies comparing those with radical
attitudes to those who have exhibited radical behaviors. The majority of studies
analyzing radical behaviors, either self-reports or terrorists, use the general, non-­
radical population as a control group. The lack of studies comparing violent and
non-violent radicals represents a significant gap in the literature. Comparing these
two groups would be the ideal way to identify which risk factors may explain the
move from radical attitudes to radical behaviors. Studies with samples of confirmed
terrorists may seek to utilize survey data from non-violent radicals in order to construct more useful comparison groups. Going forward, radicalization research
should seek to further explore the relationship between radical attitudes, radical
intentions and radical behaviors, ideally through the use of more longitudinal
studies.
References
Altunbas, Y., & Thornton, J. (2011). Are homegrown Islamic terrorists different? Some UK evidence. Southern Economic Journal, 78(2), 262–272.
Baier, D., Manzoni, P., & Bergmann, M. C. (2016). Einflussfaktoren des politischen Extremismus
im Jugendalter—Rechtsextremismus, Linksextremismus und islamischer Extremismus im
Vergleich/Influencing factors of political extremism in adolescence—right-wing extremism,
left-wing extremism and Islamic extremism compared. Monatsschrift für Kriminologie und
Strafrechtsreform/Journal of Criminology an Penal Reform, 99(3), 171–198.
Beck, L., & Ajzen, I. (1991). Predicting dishonest actions using the theory of planned behavior.
Journal of Research in Personality, 25(3), 285–301.
Berrebi, C. (2007). Evidence about the link between education, poverty and terrorism among
Palestinians. Peace Economics, Peace Science and Public Policy, 13(1), 1–76.
Brockhoff, S., Krieger, T., & Meierrieks, D. (2015). Great expectations and hard times: The
(nontrivial) impact of education on domestic terrorism. Journal of Conflict Resolution, 59(7),
1186–1215.
50
M. Wolfowicz et al.
Campana, A., & Lapointe, L. (2012). The structural “root” causes of non-suicide terrorism: A
systematic scoping review. Terrorism and Political Violence, 24(1), 79–104.
Christmann, K. (2012). Preventing religious radicalisation and violent extremism: Systematic
Review of the Research Evidence. London: Youth Justice Board for England and Wales.
Dalgaard-Nielsen, A. (2018). Patterns of disengagement from violent extremism: A stocktaking
of current knowledge and implications for counterterrorism. In Expressions of Radicalization
(pp. 273–293). Cham: Palgrave Macmillan.
Doosje, B., van den Bos, K., Loseman, A., Feddes, A. R., & Mann, L. (2012). “My In-group
is Superior!”: Susceptibility for radical right-wing attitudes and behaviors in Dutch youth.
Negotiation and Conflict Management Research, 5(3), 253–268.
Doosje, B., Loseman, A., & Van Den Bos, K. (2013). Determinants of radicalization of Islamic
youth in the Netherlands: Personal uncertainty, perceived injustice, and perceived group threat.
Journal of Social Issues, 69(3), 586–604.
Ducol, B., Bouchard, M., Davies, G., Ouellet, M., & Neudecker, C. (2016). Assessment of the
state of knowledge: Connections between research on the social psychology of the Internet
and violent extremism (pp. 16–05). Waterloo: TSAS The Canadian Network for Research on
Terrorism, Security, and Society.
Enders, W., & Hoover, G. A. (2012). The nonlinear relationship between terrorism and poverty.
American Economic Review, 102(3), 267–272.
Farrell, M. M., Findley, M. G., & Young, J. (2019). Geographical approaches in the study of terrorism. In The Oxford handbook of terrorism. Oxford: Oxford University Press.
Feddes, A. R., Mann, L., & Doosje, B. (2015). Increasing self-esteem and empathy to prevent
violent radicalization: A longitudinal quantitative evaluation of a resilience training focused on
adolescents with a dual identity. Journal of Applied Social Psychology, 45(7), 400–411.
Folk, J. B., Stuewig, J. B., Blasko, B. L., Caudy, M., Martinez, A. G., Maass, S., et al. (2018). Do
demographic factors moderate how well criminal thinking predicts recidivism? International
Journal of Offender Therapy and Comparative Criminology, 62(7), 2045–2062.
Gough, D., Thomas, J., & Oliver, S. (2012). Clarifying differences between review designs and
methods. Systematic Reviews, 1(1), 28.
Hammerstrøm, K., Wade, A., Hanz, K., & Jørgensen, A. (2009). Searching for studies: Information
retrieval methods group policy brief. In Information retrieval methods group policy brief Oslo.
Norway: The Campbell Collaboration.
Hegghammer, T. (2010). The rise of Muslim foreign fighters: Islam and the globalization of Jihad.
International Security, 35(3), 53–94.
Higgins, J. P., & Green, S. (Eds.). (2011). Cochrane handbook for systematic reviews of interventions (Vol. 4). John Wiley & Sons: Hoboken
Higginson, A., Mazerolle, L., Ham Benier, K., & Bedford, L. (2014). Predictors of youth gang
membership in low-and middle-income countries: A systematic review. Campbell Systematic
Reviews, 10, 1–67.
Higginson, A., Benier, K., Shenderovich, Y., Bedford, L., Mazerolle, L., & Murray, J. (2018).
Factors associated with youth gang membership in low-and middle-income countries: A systematic review. Campbell Systematic Reviews, 14(1), 1–128.
Jasko, K., LaFree, G., & Kruglanski, A. (2017). Quest for significance and violent extremism: The
case of domestic radicalization. Political Psychology, 38(5), 815–831.
Khan, K. S., Kunz, R., Kleijnen, J., & Antes, G. (2003). Five steps to conducting a systematic
review. Journal of the Royal Society of Medicine, 96(3), 118–121.
Khosrokhavar, F. (2014). Radicalisation. Éditions de la Maison des sciences de l’homme.
Koopmans, R. (2015). Religious fundamentalism and hostility against out-groups: A comparison
of Muslims and Christians in Western Europe. Journal of Ethnic and Migration Studies, 41(1),
33–57.
Krueger, A. B. (2008). What makes a homegrown terrorist? Human capital and participation in
domestic Islamic terrorist groups in the USA. Economics Letters, 101(3), 293–296.
What Is the State of the Quantitative Literature on Risk Factors for Radicalization…
51
Kruglanski, A. W., Chen, X., Dechesne, M., Fishman, S., & Orehek, E. (2009). Yes, no, and maybe
in the world of terrorism research: Reflections on the commentaries. Political Psychology,
30(3), 401–417.
LaFree, G., & Freilich, J. (2016). Bringing criminology into the study of terrorism. The handbook
of the criminology of terrorism, 3, 1–14.
LaFree, G., Jensen, M. A., James, P. A., & Safer-Lichtenstein, A. (2018). Correlates of violent
political extremism in the United States. Criminology, 56(2), 233–268.
Laycock, G. (2012). In support of evidence-based approaches: A response to Lum and Kennedy.
Policing: A Journal of Policy and Practice, 6(4), 324–326.
Ljujic, V., Versteegt, I., Weerman, F., Thijs, F., van Prooijen, J.W., el Bouk, F., & van de Weijer,
S. (2020). Testing a Threat Model of Terrorism: A multi-method study about socio-economic
and psychological influences on terrorism involvement in the Netherlands, in Weisburd, D.,
Savona, E., Hasisi, B., Calderoni, F. (Eds.) Understanding Recruitment to Organized Crime
and Terrorism, Springer.
Liem, M., van Buuren, J., de Roy van Zuijdewijn, J., Schönberger, H., & Bakker, E. (2018).
European lone actor terrorists versus “common” homicide offenders: An empirical analysis.
Homicide Studies, 22(1), 45–69.
Lösel, F., King, S., Bender, D., & Jugl, I. (2018). Protective factors against extremism and violent radicalization: A systematic review of research. International Journal of Developmental
Science, 12(1–2), 89–102.
Lum, C., Kennedy, L. W., & Sherley, A. J. (2006). The effectiveness of counter-terrorism strategies. Campbell Systematic Reviews, 2(2), 1–50.
Lyons, H. A., & Harbinson, H. J. (1986). A comparison of political and non-political murderers in
Northern Ireland, 1974–84. Medicine, Science and the Law, 26(3), 193–198.
Macdougall, A. I., van der Veen, J., Feddes, A. R., Nickolson, L., & Doosje, B. (2018). Different
strokes for different folks: the role of psychological needs and other risk factors in early radicalisation. International Journal of Developmental Science, 12(1–2), 37–50.
Madriaza, P., & Ponsot, A. S. (2015). Preventing Radicalization: A Systematic Review. Canada:
International Centre for the Prevention of Crime.
McCauley, C. (2012). Testing theories of radicalization in polls of US Muslims. Analyses of Social
Issues and Public Policy, 12(1), 296–311.
McCauley, C., & Moskalenko, S. (2017). Understanding political radicalization: The two-­pyramids
model. American Psychologist, 72(3), 205–216.
McCauley, C., & Scheckter, S. (2008). What's special about US Muslims? The war on terrorism
as seen by Muslims in the United States, Morocco, Egypt, Pakistan, and Indonesia. Studies in
Conflict & Terrorism, 31(11), 1024–1031.
McCleary, D. F., Quillivan, C. C., Foster, L. N., & Williams, R. L. (2011). Meta-analysis of correlational relationships between perspectives of truth in religion and major psychological constructs. Psychology of Religion and Spirituality, 3(3), 163–180.
McGilloway, A., Ghosh, P., & Bhui, K. (2015). A systematic review of pathways to and processes associated with radicalization and extremism amongst Muslims in Western societies.
International Review of Psychiatry, 27(1), 39–50.
Moskalenko, S., & McCauley, C. (2009). Measuring political mobilization: The distinction
between activism and radicalism. Terrorism and political violence, 21(2), 239–260.
Mudde, C. (2004). The populist zeitgeist. Government and Opposition, 39(4), 541–563.
Munton, T., Martin, A., Lorenc, T., Marrero-Guillamon, I., Jamal, F., Lehmann, A., Sexton, M.
(2011). Understanding vulnerability and resilience in individuals to the influence of Al Qaida
violent extremism: A Rapid Evidence Assessment. Technical Report. Home Office Occasional
Paper 98, London.
Murray, J., Shenderovich, Y., Gardner, F., Mikton, C., Derzon, J. H., Liu, J., & Eisner, M. (2018).
Risk factors for antisocial behavior in low-and middle-income countries: A systematic review
of longitudinal studies. Crime and Justice, 47(1), 255–364.
Neumann, P. R. (2013). The trouble with radicalization. International Affairs, 89(4), 873–893.
52
M. Wolfowicz et al.
Neumann, P., & Kleinmann, S. (2013). How rigorous is radicalization research? Democracy and
Security, 9(4), 360–382.
Pauwels, L. J., & Hardyns, W. (2018). Endorsement for extremism, exposure to extremism via
social media and self-reported political/religious aggression. International journal of developmental science, (Preprint), 1–19.
Pauwels, L., & Schils, N. (2016). Differential online exposure to extremist content and political
violence: Testing the relative strength of social learning and competing perspectives. Terrorism
and Political Violence, 28(1), 1–29.
Perliger, A., Koehler-Derrick, G., & Pedahzur, A. (2016). The gap between participation and violence: Why we need to disaggregate terrorist ‘profiles’. International Studies Quarterly, 60(2),
220–229.
Ranstorp, M. (2006). Introduction: mapping terrorism research–challenges and priorities. In
Mapping terrorism research (pp. 15–42). New York: Routledge.
Reid, E. F. (1997). Evolution of a body of knowledge: An analysis of terrorism research.
Information Processing & Management, 33(1), 91–106.
Reid, E. F., & Chen, H. (2007). Mapping the contemporary terrorism research domain. International
Journal of Human-Computer Studies, 65(1), 42–56.
Sageman, M. (2004). Understanding terror networks. Philadelphia: University of Pennsylvania
Press.
Sageman, M. (2014). The stagnation in terrorism research. Terrorism and Political Violence, 26(4),
565–580.
Scarcella, A., Page, R., & Furtado, V. (2016). Terrorism, radicalisation, extremism, authoritarianism and fundamentalism: A systematic review of the quality and psychometric properties of
assessments. PLoS One, 11(12), e0166947.
Schmid, A. P. (2011). The literature on terrorism. In The routledge handbook of terrorism research
(pp. 475–492). New York: Routledge.
Schmid, A. P. (2013). Radicalisation, de-radicalisation, counter-radicalisation: A conceptual discussion and literature review. ICCT Research Paper, 97(1), 22.
Schmid, J., & Jongman, A. (1983). Political terrorism: A new guide to actors, authors, concepts,
data bases, theories.
Schmid, A. P., & Jongman, A. J. (1988). Political terrorism: A new guide to actors, authors, concepts, databases, theories and literature, Amsterdam. New Brunswick: SWIDOC, Transaction
Books.
Schuurman, B. (2018). Research on terrorism, 2007–2016: A review of data, methods, and authorship. Terrorism and Political Violence, 1–16.
Schuurman, B., & Eijkman, Q. (2013). Moving terrorism research forward: The crucial role of
primary sources. ICCT Background Note, 4.
Sedgwick, M. (2010). The concept of radicalization as a source of confusion. Terrorism and political violence, 22(4), 479–494.
Shenderovich, Y., Eisner, M., Mikton, C., Gardner, F., Liu, J., & Murray, J. (2016). Methods for
conducting systematic reviews of risk factors in low-and middle-income countries. BMC
Medical Research Methodology, 16(1), 32.
Silke, A. (2001). The devil you know: Continuing problems with research on terrorism. Terrorism
and political violence, 13(4), 1–14.
Silke, A. (2004). The road less travelled: Recent trends in terrorism research. In Research on terrorism: Trends, achievements and failures (pp. 186–213). London: Frank Cass.
Silke, A. (2007). The impact of 9/11 on research on terrorism. In Mapping terrorism research
(pp. 90–107). London/New York: Routledge.
Silke, A. (2009). Contemporary terrorism studies: issues in research. In Critical terrorism studies
(pp. 48–62). London: Routledge.
Smith, B. L., & Morgan, K. D. (1994). Terrorists right and left: Empirical issues in profiling
American terrorists. Studies in Conflict & Terrorism, 17(1), 39–57.
What Is the State of the Quantitative Literature on Risk Factors for Radicalization…
53
Spaaij, R., & Hamm, M. S. (2015). Key issues and research agendas in lone wolf terrorism. Studies
in Conflict & Terrorism, 38(3), 167–178.
Stankov, L., Knežević, G., Saucier, G., Radović, B., & Milovanović, B. (2018). Militant extremist
mindset and the assessment of radicalization in the general population. Journal of Individual
Differences, 39, 88–98.
Stern, J. (2016). Radicalization to extremism and mobilization to violence: What have we learned
and what can we do about it? The Annals of the American Academy of Political and Social
Science, 668(1), 102–117.
Tausch, N., Spears, R., & Christ, O. (2009). Religious and national identity as predictors of attitudes towards the 7/7 bombings among British Muslims: An analysis of UK opinion poll data.
Revue Internationale de Psychologie Sociale, 22(3), 103–126.
van Bergen, D. D., Ersanilli, E. F., Pels, T. V., & De Ruyter, D. J. (2016). Turkish-Dutch youths’
attitude toward violence for defending the in-group: What role does perceived parenting play?
Peace and Conflict: Journal of Peace Psychology, 22(2), 120–133.
Van Bergen, D. D., Feddes, A. F., Doosje, B., & Pels, T. V. (2015). Collective identity factors and
the attitude toward violence in defense of ethnicity or religion among Muslim youth of Turkish
and Moroccan Descent. International Journal of Intercultural Relations, 47, 89–100.
Van den Bos, K., Loseman, A., & Doosje, B. (2009). Waarom jongeren radicaliseren en sympathie
krijgen voor terrorisme: Onrechtvaardigheid, onzekerheid en bedreigde groepen. Research and
Documentation Centre of the Dutch Ministry of Justice.
Victoroff, J. (2005). The mind of the terrorist: A review and critique of psychological approaches.
Journal of Conflict Resolution, 49(1), 3–42.
Windisch, S., Simi, P., Ligon, G. S., & McNeel, H. (2017). Disengagement from ideologically-based
and violent organizations: A systematic review of the literature. Journal for Deradicalization,
9, 1–38.
Zhirkov, K., Verkuyten, M., & Weesie, J. (2014). Perceptions of world politics and support for
terrorism among Muslims: Evidence from Muslim countries and Western Europe. Conflict
Management and Peace Science, 31(5), 481–501.
Resilience against Political and Religious
Extremism, Radicalization, and Related
Violence: A Systematic Review of Studies
on Protective Factors
Friedrich Lösel, Doris Bender, Irina Jugl, and Sonja King
Introduction
Politically, religiously, ethnically, or otherwise motivated extremism, radicalization
towards violence, and recruitment for terrorism are urgent topics worldwide. In
spite of numerous activities to counteract these problems, there is still very limited
knowledge about valid risk factors, potential causes, developmental processes, and
effective interventions (Jensen et al. 2016; Monahan 2017; Sageman 2014; Silke
2001). This is insofar plausible as various problems complicate research and
practice:
There is no widely accepted definition of ‘terrorism’ (Schmid 2004, 2012), and
the terms ‘extremism’ or ‘radicalization’ are also used in different ways. In the present chapter, we use the following working definitions: Extremism implies a verbal
or active opposition to basic values in a society, such as democracy, equality, liberty,
rule of law, and tolerance for the faiths and beliefs of others. Radicalization is a
process by which a person adopts beliefs that justify the use of violence for social
and/or political change. Terrorism is viewed as an intentional act or threat of violence by a non-state actor that aims to attain a political, religious, economic, or
social goal, and coerces or intimidates an audience beyond the direct victims
(Doosje et al. 2016; Maskaliūnaitė 2015; Strom et al. 2017).
In empirical research, extremism and radicalization often refer to gradual differences in attitudes and behavior without clear thresholds of seriousness for violence
(Bartlett and Miller 2012; Kruglanski et al. 2009). The main target groups are
F. Lösel (*)
Institute of Psychology, University of Erlangen-Nuremberg, Erlangen, Germany
Institute of Criminology, University of Cambridge, Cambridge, UK
e-mail: fal23@cam.ac.uk; friedrich.loesel@fau.de
D. Bender · I. Jugl · S. King
Institute of Psychology, University of Erlangen-Nuremberg, Erlangen, Germany
© Springer Nature Switzerland AG 2020
D. Weisburd et al. (eds.), Understanding Recruitment to Organized Crime
and Terrorism, https://doi.org/10.1007/978-3-030-36639-1_3
55
56
F. Lösel et al.
h­ eterogeneous and embrace far-right, far-left, religiously motivated, nationalist/
separatist, or those who focus on single issues such as animal protection or environmental conservation (Doosje et al. 2016). However, the respective ideologies are not
necessarily distinct. For example, religious, ethnic, and nationalist motivation may
partially overlap (Doosje et al. 2016; Lösel et al. 2018) and show similarities in
developmental pathways (Ebner 2017; Jensen et al. 2016). Not all members of specific extremist groups are mainly driven by the respective ideology (e.g., Sawyer
and Hienz 2017) and underlying personality factors such as thrill-seeking may also
play a role (e.g., Pauwels and Heylen 2017).
Although plausible phases of radicalization have been proposed, the sequences
of individual needs, triggering events, ideological narratives, group affiliation, and
social identity are neither uniform nor generally lead to violent action (Borum 2011;
Jensen et al. 2016; Webber and Kruglanski 2017). Whereas most research shows
that extremist group membership plays an important core role in radicalization,
there are cases of ‘lone-actor’ terrorism that seem to be related to mental health
problems or influences from the internet (Corner and Gill 2015; Meloy and Genzman
2016). This heterogeneity questions the aim of a general theory on the topic. The
theoretical literature contains a range of explanations with concepts such as social
identity, strain, social learning, social bonding, rational choice, social movement,
group dynamics, reactance formation, intolerance of ambiguity, mental health, and
other psychosocial domains (e.g., Kruglanski et al. 2017; Raets 2017; Sageman 2017).
Methodological issues also contribute to the limited state of knowledge. Most
research is based on cross-sectional data or retrospective case analyses, whereas
sound prospective longitudinal designs are rare (Scarcella et al. 2016). Other methodological challenges are the very low base rates of the most serious cases, incomplete information in official data files, or cooperation and language barriers in
the assessments of extremists. Although there are practical approaches to counteract
terrorist plots (e.g., Perry et al. 2017; Strom et al. 2017), the low quality of many
early prevention programs of radicalization is also a methodological problem (e.g.,
Armborst and Kober 2017; Beelmann 2017).
Protective Factors and Resilience
Sound knowledge on risk factors is a key for improving approaches to prevent
extremism and radicalization. Risk factors are individual or social characteristics
that predict an enhanced probability of outcomes like the onset of extremism, radicalization towards violent behavior, or (in rare cases) terrorist acts. Risk factors can
be causes of the respective outcome, but basically, they only indicate a correlational
relationship. Kraemer et al. (2005) distinguished between merely correlative risk
factors, risk markers, and truly causal risk factors. Risk markers are variables that
may indicate an influence on the outcome, but do not have a causal impact by themselves (e.g., male sex). A causal risk factor can be assumed when the change of the
respective variable in a well-controlled intervention leads to a change in the o­ utcome
Resilience against Political and Religious Extremism, Radicalization, and Related…
57
(e.g., abstaining or desistance). Although there are many publications on disengagement and de-radicalization (e.g., Berger 2016; Raets 2017), the methodological
bases in this field do not yet allow clear causal conclusions.
The instruments for assessing risks for radicalization, extremism, and potential
terrorism are based on theoretical assumptions and correlational research. Important
instruments are, for example, VERA-2R, ERG 22+, TRAP-18, MLG, IVP, RAT,
and RADAR-ItE (see King et al. 2017; Rettenberger 2016). While the contents of
some instruments are openly accessible, other measures (particularly those used by
the police or intelligence services) are not published for plausible reasons. Most risk
assessment tools apply a structured clinical judgment approach. The respective constructs and variables of the different instruments are similar, but the concrete items
vary depending on the developmental phase and context of the target group. For
example, early developmental prediction in the community addresses different
issues than risk assessment of radicalized inmates in prisons. When applied to the
latter group, the various scales correlate significantly (King et al. 2018).
These instruments are promising, but partially due to the above mentioned methodological problems, the overall validity is still limited (Monahan 2017; Sarma
2017; Scarcella et al. 2016). Similar to other forms of violence, not single risk factors, but their accumulation is most indicative (Jensen et al. 2016). However, even
when all known terrorists have a specific pattern of (mainly static) risk factors, the
majority of people with these characteristics in the general population are not violent extremists. Accordingly, there is concern about many false positives that may
be inappropriately stigmatized (Royal College of Psychiatrists 2016; Sarma 2017).
To reduce false positives, risk assessment should refer to potential protective factors. VERA-2 contains some protective items (Pressman and Flockton 2012), but
overall, the topic requires more attention. Knowledge about protective factors is
also necessary for a better understanding and theoretical explanation of radicalization processes. Doosje et al. (2016) rightly refer to ‘shields of resilience’ that interrupt the development from extremist orientation to membership in radical groups
and to violent action. Similarly, the authors assume that protective factors contribute
to de-radicalization and disengagement.
Resilience refers to phenomena such as healthy development despite a high-risk
status, maintaining competence under specific stressors, or recuperating from severe
trauma (Lösel and Bender 2003; Rutter 2012). These phenomena correspond to the
elementary biosocial mechanisms of protection, regeneration, and repair. The processes of successful adaptation to and coping with developmental risk situations
require individual and social resources that function as protective factors. These
factors may ‘explain’ why individuals with similar risk profiles show different
behavioral outcomes. Knowledge about protective factors cannot only reduce the
rate of false positives in prediction, but help to design successful preventive
approaches.
There is much less research on protective factors against extremism and radicalization than on risk factors. This situation is similar to the broader
literature on violence of young people (Lösel and Farrington 2012). Protective factors are often misunderstood as the other ‘side of the coin’ or the opposite pole of a
quantitative risk factor. However, the analysis of protective factors and processes of
58
F. Lösel et al.
resilience requires more differentiated research methods (Lösel and Bender 2003,
2017). For example, one has to investigate curvilinear relations between quantitative variables of direct protective (promotive) factors and, in particular, study buffering effects in interaction analyses and hierarchical regressions when risk factors
are present (Loeber and Farrington 2012; Lösel and Farrington 2012). For conceptual and methodological discussions of research on protective factors and resilience,
see Luthar et al. (2000), Lösel and Bender (2003), or Masten (2016).
This article investigates factors that may strengthen resilience and have a protective function in the presence of risk factors for extremism and radicalization. We
also address factors that may help to disengage and desist from extremist violence.
We carried out a systematic review of empirical studies on these topics. Since a pilot
search showed very few relevant studies on violent behavior as outcome, we also
included research on violence-related extremist attitudes. In the following, we present the methodology of our systematic review and main results of both quantitative
and qualitative analyses. Finally, we discuss the findings from an integrative perspective and address theoretical and practical implications as well as limitations.
Method
Eligibility of Studies
We included research on far right, far left, religiously motivated, nationalist/separatist, and special issue groups (Doosje et al. 2016). Protective factors were defined as
characteristics that reduced the probability of radical violent acts, the willingness to
use radical violence, or attitudes that support or justify violence. Studies examining
broader underlying propensities (e.g., right-wing authoritarianism or social dominance) were not included. In accordance with research on resilience (e.g., Lösel and
Bender 2017) and desistance from crime (Farrall et al. 2011; Shapland et al. 2012),
we also included outcomes of de-radicalization and disengagement studies (e.g.,
Barrelle 2015; Bjørgo 2011). Both concepts are multidimensional and not generally
defined (Clubb 2015; Raets 2017), but de-radicalization primarily refers to cognitive changes, whereas disengagement implies a behavioral change (i.e. desistance
from violence or leaving a terrorist group).
There was no restriction regarding time and mode of publication of the primary
studies. ‘Unpublished’ work such as dissertations or ‘grey’ literature was included.
We focused on publications in English and German language, but did not get casual
knowledge about empirical studies in other languages. All countries of origin
regarding the local context of the research and the publication were eligible. There
was also no restriction concerning the scientific discipline of authors and research
institutions.
The main goal of the systematic review was to integrate empirical studies with
quantitative results on protective factors against extremism and radicalization. The
study design could be both cross-sectional and longitudinal. Beyond correlational
Resilience against Political and Religious Extremism, Radicalization, and Related…
59
designs, we included intervention studies targeting extremism if they provided
quantitative data on specified protective factors.
Since studies on de-radicalization and disengagement are usually case-oriented
and mostly refer to individual experiences and narratives, we also included qualitative designs in our search. The opinions on quantitative versus qualitative methods
are often polarized, but in research practice, there are meaningful and content-­
oriented combinations of both (Lösel 1985). The methodological standards of qualitative research are less elaborated and more homogeneous than those for quantitative
and, in particular, experimental designs. Popay et al. (1998), Hammarberg et al.
(2016), and other authors provided some guidelines for judging qualitative research.
Accordingly, we requested that the qualitative studies must have sufficiently valid
indicators of de-radicalization, provided descriptions of the respective method of
data gathering, contained at least ten cases, and drew integrative conclusions about
the investigated protective factors. To increase the data base, we also considered
qualitative studies examining protective factors in not yet clearly radical individuals, provided they fulfilled the other above mentioned criteria. Because of the different contents and methods of the quantitative and qualitative studies, the results of
both approaches will be reported separately. Our main focus lies on the more comprehensive quantitative research; we refer to the qualitative findings more briefly.
Literature Search
The results of meta-analyses and systematic reviews strongly depend on the search
terms used in databases. In a pilot test of search terms, we used a rather general
string, e. g., “protect∗ AND terroris∗”. This led to an unmanageable number of
mainly irrelevant results. We also tested a very narrow search string, e.g., “protective AND factor∗ AND terroris∗”. This reduced the number of usable results too
much. We thus created a few rather complex search strings including the terms
right-wing, left-wing, islamis*, salafi*, radicali*, jihad*, extremis*, and terror∗
combined WITH protect*, buffer*, resilien*, factor*, disengag*, deradical*, moderat*, reject*, desist∗.
Using these strings, we searched the following databases: Cochrane Library,
Campbell Reviews, Dissertation Abstracts, MEDLINE, PubMed, EMBASE, ERIC,
German National Library, PsycINFO, Psyndex, Science Direct, Scopus, Sociological
Abstracts, Sociological Collection, and World Cat. After the elimination of duplicates, the final output resulted in 451 titles. The subsequent stepwise screening process reduced the number to only eight relevant quantitative reports. Such a low
turnout from searches in databases is not rare in systematic reviews (e.g., Schmucker
and Lösel 2011). Therefore, we also used contacts to experts in the field and screened
relevant websites as well as the references of articles. This ‘snowball method’
revealed more than 2,000 documents. Most of them had to be excluded on the title
level, some others on the abstract level. Further details of our search are presented
in the PRISMA flow diagram in Fig. 1.
Identification
60
F. Lösel et al.
Reports identified through
database searching
(n = 451)
Reports identified through
snowballing method
(n = 2,264)
Additional
reports
(n = 7)
Reports (abstracts) screened
(n = 354)
Reports excluded
(n = 318)
Full-text reports assessed
for eligibility
(n = 36)
Reports excluded
(n = 28)
Eligibility
Screening
Reports after duplicates
removed
(n = 354)
Included
Eligible reports
(n = 8)
Eligible reports
(n = 15)
Eligible reports
(n = 1)
Included in the review
nquantitative = 17 reports
nqualitative = 7 reports
Fig. 1 Flow chart of the search process in the systematic review
In total, we retrieved 24 documents that met our eligibility criteria. Seventeen
reports provided quantitative data. Some of them contained more than one data set
or separate analyses so that we could finally include 21 quantitative analyses. Seven
studies had a qualitative design of which six contained direct data on radical individuals. In sum, 28 empirical analyses (“studies”) could be included in this review.
Coding
As Lipsey and Wilson (2001) recommended for reviews with small numbers of
primary studies, we coded the content after a discussion and consensus of two members of our research team.
Main categories of our scheme can be seen in the comprehensive table in the
Appendix. Most characteristics of the primary studies could be easily coded because
they were simple facts (e.g., country of origin, publication type, sample size, and
Resilience against Political and Religious Extremism, Radicalization, and Related…
61
age of participants). Some information was more complex, in particular with regard
to the type and construct of the respective protective factors. In these cases, we
avoided too extensive interpretations and adhered as much as possible to the categories reported by the primary study authors. In some studies, we had to be more
interpretative, for example, when Baier et al. (2016) equated islamist extremism
with hostility towards Germans. In this and other cases, the two coders discussed the
issue and reached a consensus. In principle, the studies with qualitative designs
were similarly coded as the quantitative research, but there were some differences.
For example, the findings of qualitative studies were mainly based on interpretations of the authors and not on statistical tests. As the qualitative studies addressed
processes of disengagement or de-radicalization, we also coded whether there was
more a ‘push’ or a ‘pull’ influence (Altier et al. 2014; Bjørgo 2011).
Descriptive Characteristics of the Dataset
The main characteristics of the quantitative studies are shown in the Appendix.
Eleven studies addressed religious/ethnic and five ones right-wing extremism and
radicalization. The other types were less frequent. Most of the quantitative studies
had a cross-sectional design. Four studies reported effects of an intervention with a
pre-post-design without a control group.
Ten quantitative studies were carried out in Europe, three ones in the Middle
East, two ones in North America, and one in Asia and Africa respectively. Most
samples were young people below the age of 30. Six studies included school students or other groups in education. Two studies addressed convicted radical offenders. For further details of the participants of the studies, see Appendix.
Most quantitative analyses addressed both risk and protective factors, but this
article refers to protective effects only. Twelve data analyses applied logistic regressions, four ones linear regressions, six ones LISREL or other path models, and two
ones used a pre-post group comparison. Depending on the respective statistical
analyses, the protective effects were identified by significant beta weights or path
coefficients that indicated a reduction of the extremist outcome criteria. Only
Pauwels and Svensson (2017) carried out moderator analyses on interactions of the
protective factors with a present risk. Eight studies addressed violent behavior, ten
ones violence-prone attitudes, and five ones the willingness to use violence. Two
analyses formed a composite score of violent behavior and attitudes. Many outcome
data (n = 13) were self-reports of the participants. Two studies analysed answers to
written scenarios and two studies used a special database (PIRUS) that contained
information on radicalization in the U.S. (including files of convicted extremists).
The qualitative studies investigated disengagement of individuals who had been
involved in more or less violent extremist organizations. Three studies examined
former jihadists (Syria/Iraq and Indonesia). In two studies, the participants formerly
adhered to nationalist/separatist ideologies (Northern Ireland and Spain). One study
included extremists from different organizations including violent far-right, jihad-
62
F. Lösel et al.
ist, and separatist, as well as nonviolent environmental organizations in Australia.
Further characteristics of these studies are presented in Table 2 in the results section.
Whereas these six studies dealt with self-reported disengagement, there was
another study that interviewed young at-risk individuals as well as service providers
to investigate resilience against violent extremism on the individual and community
level (Weine and Ahmed 2012). Overall, the qualitative studies did not provide as
many and as detailed data on the samples, variables, and other characteristics as the
quantitative analyses.
Results
Results of the Quantitative Studies
All quantitative studies analysed more than one potentially protective factor and
some even more than ten. For reasons of parsimony and clarity, in this article we
only present results on those variables that showed a significant protective effect. Of
course we are aware of the risk of multiple statistical tests, but in the light of some
small samples in the primary studies and the rather exploratory (not theory-testing)
character of our review, we set p < .10 as a threshold. Most significant effects were
at p < .05 or lower (see Appendix). Altogether, we found 30 different variables with
an effect that could be interpreted as being protective against extremism in the presence of risk factors. Some studies only detected one protective effect, but others up
to nine or ten (Bhui et al. 2014; Baier et al. 2016). We subsumed the variables to the
categories that Lösel and Farrington (2012) used for their classification of protective
effects against violence of young people: Individual, family, school, peer group, and
community/society factors, although there is some overlap between these categories. We will not go through all the detailed findings, but concentrate on those that
based on more than one analysis and/or were relevant for different types of extremism. Table 1 presents the condensed results from the Appendix.
At the individual level, self-control protected against far-right, far-left, and religious/ethnic extremism and radicalization (Pauwels and Svensson 2017). Adherence
to law was also a protective factor against extremist attitudes in the religious/ethnic
(mainly islamist), far-right, and far-left spectrum (Baier et al. 2016). It also reduced
violent left-wing extremist behavior (Baier et al. 2016). Acceptance of police legitimacy (Pauwels and De Waele 2014) and illness/disease (Bhui et al. 2014) also had
a protective effect in more than one analysis. Somewhat surprising was the finding
that subjective deprivation of one’s socio-economic status protected against right-­
wing extremism (Fuchs 2003).
At the family level, an appreciative, positive parenting style (Baier et al. 2016;
van Bergen et al. 2016), non-violent significant others (Jasko et al. 2016), and ownership of residential property (Asal et al. 2008) had a protective effect against different kinds of extremism/radicalization.
There were also replicated protective effects at the school level. Good school
achievement and bonding to school reduced far-right and far-left extremist attitudes
Resilience against Political and Religious Extremism, Radicalization, and Related…
63
Table 1 Main results of quantitative studies on protective factors against political and religious
extremism and radicalization
Factor
Individual factors
Self-control
Empathy
Value complexity
Anxiety about getting
incarcerated
Acceptance of police
legitimacy
Adherence to law
Political disinterest
Low importance of
religion
Intensive religious
practice
Employment
Perceived personal
discrimination
Subjective
deprivation of SESa
Dissatisfaction with
quality of life
Illness, depression
Threatening life
events
Family factors
Appreciative
parenting behavior
Ownership of
residential property
Family members not
involved in violence
Significant other not
involved in violence
Incarceration of a
family member
Membership in
specific religious
group
School factors
Higher educational
level
Type of
ideology
No. of
effects
Outcome criteria
Study
rw, lw, r/e
3
Behavior
r/e
r/e
n/s
1
1
1
Attitude
Behavior
Attitude
Pauwels and Svensson
(2017)
Feddes et al. (2015)
Liht and Savage (2013)
Cragin et al. (2015)
rw, rw
2
Behavior
rw, lw, r/e,
lw
n/s
r/e, r/e
4
Attitude, behavior
Pauwels and De Waele
(2014)
Baier et al. (2016)
1
2
Willingness
Attitude
Cragin et al. (2015)
Bhui et al. (2014)
r/e
1
Attitude and behavior
Muluk et al. (2013)
mixed
rw
1
1
Behavior
Behavior
rw
2
n/s
1
Attitude, attitude and
behavior
Attitude
Jensen et al. (2016)
Pauwels and De Waele
(2014)
Fuchs (2003)
r/e, r/e, r/e
r/e
3
1
Attitude
Attitude
Bhui et al. (2014)
Bhui et al. (2014)
lw, r/e
2
Attitude,Willingness
r/e, r/e
2
Attitude
Baier et al. (2016), van
Bergen et al. (2016)
Asal et al. (2008)
n/s
1
Willingness
Cragin et al. (2015)
mixed,
mixed
n/s
2
Behavior
Jasko et al. (2016)
1
Attitude
Cragin et al. (2015)
r/e
1
Attitude
Asal et al. (2008)
r/e
1
Attitude and behavior
Muluk et al. (2013)
Cragin et al. (2015)
(continued)
64
F. Lösel et al.
Table 1 (continued)
Factor
Good school
achievement
Bonding to school
Peer group factors
Non-violent peers
Type of
ideology
rw,
lw, rw, rw
rw, lw
n/s, mixed,
mixed
More social contacts/ r/e
social networks
Contact to foreigners rw, rw
Community/society factors
Basic attachment to r/e, r/e, r/e
society
Low social capital
r/e
Migrant of the first
r/e
generation
No. of
effects
4
Outcome criteria
Attitude, behavior
2
Attitude
3
Willingness, behavior
1
Attitude
2
Attitude, attitude and
behavior
Fuchs (2003)
3
Willingness, attitude
1
1
Attitude
Attitude
van Bergen et al.
(2015, 2016)
Bhui et al. (2014)
Bhui et al. (2014)
Study
Baier et al. (2016),
Boehnke et al. (1998)
Baier et al. (2016)
Cragin et al. (2015),
Jasko et al. (2016)
Bhui et al. (2014)
Notes. rw right-wing ideology, lw left-wing ideology, r/e religious/ethnic ideology, n/s nationalist/
separatist ideology, behavior violent extremist behavior, attitude extremist attitudes, willingness
willingness to engage in violent extremist behavior, attitude and behavior composite score of
behavior and attitudes
a
Negative evaluation of own socio-economic status
and behavior (Baier et al. 2016; Boehnke et al. 1998). The finding of Muluk et al.
(2013) on a protective effect of higher education against religious/ethnic extremism
was similar.
With regard to peer group influences, contact with non-violent peers had a protective effect against mixed types of extremism and nationalist/separatist orientations (Cragin et al. 2015; Jasko et al. 2016). More specific was the finding that
contact to foreigners came along with less right-wing extremism (Fuchs 2003).
The latter result could also be subsumed under factors on the community/society
level, where a basic attachment to society was protective against religious/ethnic
extremism (van Bergen et al. 2015, 2016). That only very few other protective factors were found in this domain was insofar plausible as all primary studies gathered
data from individuals that also reflect influences at the meso- and macro-level.
Most of the significant quantitative results in our review were found in single
studies, i.e. they based on one sample, one cultural context, and one type of extremism/radicalization respectively (see Table 1). The majority of these findings are
plausible: For example, a protective function of employment (Jensen et al. 2016),
empathy with non-Muslims (Feddes et al. 2015), becoming politically disinterested
(Cragin et al. 2015), understanding complexity in values (Liht and Savage 2013),
having non-violent family members (Cragin et al. 2015), being a first generation
migrant (Bhui et al. 2014), and showing concern about getting incarcerated or the
equally deterring experience of incarcerated family members (Cragin et al. 2015).
Resilience against Political and Religious Extremism, Radicalization, and Related…
65
Table 2 Main results of qualitative studies on disengagement and de-radicalization from extremist
violence
Factor
Individual factors
Disillusionment with group leaders or members
Disillusionment with group methods
Unmet expectations
Own identity
Age, mental and physical health
Competing loyalty
Change of mind, time to think
Costs-benefit reflections
Family factors
Good family ties
Family pressure against extremism
Own parenthood
Peer group and other social factors
Social relations
Positive social experiences, social integration
Detachment from extremist group through
imprisonment
Community and society factors
Change in political situation, legitimacy conflict
Imprisonment
Type of
ideology
Studya
Push/pull
factors
r/e, n/s, mixed
r/e, mixed
r/e
mixed
n/s, mixed
r/e
r/e, n/s
r/e
1, 2, 3, 4, 5, 6
1, 2, 3, 5, 6
3, 6
1
1, 4, 5, 6
6
2, 3, 4, 5
2, 3
Push
Push
Push
Pull
Push
Pull
Mixed
Mixed
r/e, n/s
r/e
n/s
4, 6
2, 3
4, 5
Pull
Pull
Pull
r/e, n/s, mixed
r/e, mixed
n/s
1, 2, 3, 4, 5
1, 2
4
Pull
Pull
Mixed
n/s
n/s
4, 5
4, 5
Pull
Mixed
Notes. r/e religious/ethnic ideology, n/s nationalist/separatist ideology
Studies listed in the third column: (1) Barrelle (2015); (2) Chernov Hwang (2015); (3) Chernov
Hwang et al. (2013); (4) Ferguson (2016); (5) Reinares (2011); (6) van der Heide and Huurman
(2016)
a
Other single results seemed to be somewhat contradictive, such as intensive religious practice (Muluk et al. 2013) versus low importance of religion (Bhui et al.
2014), having a wider social network versus low social capital (Bhui et al. 2014), or
being dissatisfied with own quality of life (Cragin et al. 2015). Such findings should
not be generalized across countries, topics, and samples. We will address this issue
in the discussion section.
Results of the Qualitative Studies
The main results of the qualitative studies are shown in Table 2. The most common
factor leading to disengagement from violent groups was disillusionment, in particular with group leaders and/or members or methods used by the group. Desisting
individuals also reported unmet expectations, for example, regarding their own identity as a group member (Chernov Hwang et al. 2013; van der Heide and Huurman
66
F. Lösel et al.
2016). In addition to these push factors, there were also pull factors such as positive
social relations outside the radicalized group, receiving family support, and the
experience of being treated well by authorities (Barrelle 2015; Chernov Hwang
2015). Family played not only an important role through strong ties, but also through
social pressure or own parenthood (Ferguson 2016; Reinares 2011). Some studies
reported a change of mind that followed a cost-benefit-analysis of the own radicalization (Chernov Hwang 2015; Reinares 2011). These individual change processes
seem to be triggered or promoted by contextual factors like changes in the political
situation or imprisonment that detached the individual from the extremist group and
provided “time to think”. Weak physical and psychological conditions, ageing, and
mental health problems also fostered disengagement in four studies (see Table 2).
The study that included information from service providers (Weine and Ahmed
2012) suggested a range of protective factors, e.g., family awareness of risks and
safeguards, parental monitoring and supervision, family confidants and social support, access to services and helpers, parental involvement in mosques and religious
education, focus on a future in the United States, rejection of tribalism and war,
youth civic engagement, and political dialogue. Parents’ information of law enforcement and community institutions about recruiters and associates were also seen as
steps towards desistance from radical groups.
Discussion
To our knowledge, our project is the first one that carried out a systematic review of
protective factors against extremism, radicalization, and related violence. Our search
procedure yielded a large number of potentially relevant documents, but most of
them contained theoretical, political, practical, or single case discussions. Despite
our broad eligibility criteria and the inclusion of both quantitative and qualitative
designs, we finally could only include 24 empirical studies. Most of the quantitative
studies focused on early phases of radicalization and about half of them analysed
extremist attitudes and not aggressive behavior. However, early “shields of resilience” (Doosje et al. 2016) on the attitude level are important because most terrorists
were affiliated with non-violent extremism before turning violent (Nesser 2016).
Our review revealed various protective factors on the individual, family, school,
peer-group, and community level. It is promising that most of the eligible studies
were recent, which indicates a growing research interest in this topic. In the quantitative studies, the main protective factors were self-control, a basic adherence to
law, and police legitimacy, employment, positive family ties, sound school achievement and bonding, non-deviant peers, and a basic attachment to society. The qualitative studies addressed push and pull factors in the process of disengagement from
radical violence. Here, the main protective factors were disillusionment with the
radical groups and their methods, positive family ties and social experiences outside
the radical group, self-reflection about own identity and change of mind, critical life
events such as health problems, imprisonment or own parenthood. In the following,
our findings are discussed in more detail and related to theoretical concepts.
Resilience against Political and Religious Extremism, Radicalization, and Related…
67
Discussion of the Quantitative Studies
Individual factors Table 1 shows that self-control was a protective factor in various
analyses. This is consistent to research in other fields of crime and violence (Lösel
and Bender 2017). Another significant protective factor was employment (Jensen
et al. 2016), which is consistent with protective effects against and desistance from
crime (Lösel and Farrington 2012; Sampson and Laub 2003). The protective function of anxiety about being caught is also in accordance with the broader literature
on youth violence (Lösel and Farrington 2012). Anxiety is related to enhanced
arousal and may thus protect against risky behavior and thrill-seeking (Raine 2013).
The finding of empathy for non-Muslims as a protective factor (Feddes et al. 2015)
is in line with theories and results on perspective taking as a part of social information processing in violence research (Dodge and Pettit 2003; Lösel et al. 2007). The
protective effect of value complexity (Liht and Savage 2013) points in the same
direction. The ability to switch perspective and reflect different values can counteract black-and-white thinking that is a component of hostile cognitive schemata.
However, we should also be aware of the potential “double face” of protective factors (Lösel and Bender 2003): For example, if there is only selective empathy for the
own religious group (Rahimullah et al. 2013), it may not have a protective function,
but be a risk for aggression against other groups.
At first glance, the findings on a protective effect of subjective deprivation and
dissatisfaction with the own quality of life are surprising because these factors can
also constitute a risk for extremism and violence. The respective studies addressed
attitudes towards suicide attacks in the West Bank (Cragin et al. 2015), far-right
attitudes of students in Germany (Fuchs 2003), and attitudes on religious extremism
of young adults in Belgium (Pauwels and De Waele 2014). Probably there are different underlying mechanisms in these results. For example, the far-right attitudes
in the German study were related to higher self-esteem and authoritarian attitudes
that may counteract feelings of discrimination and deprivation. This is in a­ ccordance
with feelings of superiority in right-wing Flemish groups (De Waele and Pauwels
2016). Feelings of dissatisfaction may indicate internalizing behavior problems that
go along with social withdrawal and thus can protect against affiliation with deviant
groups (Lösel and Farrington 2012).
Some individual protective factors such as acceptance of police legitimacy and
adherence to law and the society (Baier et al. 2016; van Bergen et al. 2015, 2016;
Pauwels and De Waele 2014) are related to the broader social context and will be
discussed below.
Family factors Table 1 shows various protective family factors. A positive, appreciating parenting style (Baier et al. 2016; van Bergen et al. 2016) and significant
others as well as family members who are not involved in violence (Cragin et al.
2015; Jasko et al. 2016) protected against extremism and radicalization. Family
ownership of residential property also showed a protective effect (Asal et al. 2008).
This is similar to the protective function of the family’s socio-economic status that
was found in research on youth violence (Lösel and Bender 2017).
68
F. Lösel et al.
School factors Our review also showed various protective factors in the school
domain. Good school achievement, bonding to school, and a higher educational
level had a protective effect against extremism and radicalization (Baier et al. 2016;
Boehnke et al. 1998; Muluk et al. 2013). Although our synthesis (like other studies)
subsumed school achievement under school factors, this variable also indicates
above-average intelligence that has shown a more general protective effect against
violence and crime in other studies (Ttofi et al. 2016).
Peer group factors In the domain of peer relations, there were various plausible
findings. Contact with non-deviant peers had a protective effect (Cragin et al. 2015,
Jasko et al. 2016). This is in accordance with the literature on a protective effect of
non-deviant peers against youth crime and violence (Lösel and Farrington 2012). A
larger social network seemed to be protective against extremism (Bhui et al. 2014),
which may be due to more non-extremist contacts.
Community/society factors Our review only revealed few protective factors that
can be subsumed to this level. This is insofar plausible as several individual and
micro-social factors are more or less indirectly related to the broader social context.
Van Bergen et al. (2015, 2016) showed that a basic attachment to or integration into
society protects against extremism and radicalization. This finding is in accordance
with the theory on informal social control and social bonding (Hirschi 1969). Social
bonding may also strengthen the protective function of self-control (Hirschi 2004),
but this hypothesis needs more empirical support (Lösel 2017). Bhui et al. (2014)
reported that first-generation immigrants are better protected against religious/ethnic extremism than later generations. This is in accordance with research on youth
violence (Walburg 2014) and relates micro- and macro-social processes. Whereas
first generation immigrants often seek to adapt to the values and life style of the new
country, later generations seem to have an enhanced risk of delinquency, perhaps
due to integration problems, parenting behavior, and less successful careers at
school and work (Baier et al. 2009). The protective function of a basic acceptance of
the society’s values, laws, and police legitimacy (Baier et al. 2016; van Bergen et al.
2015, 2016; Pauwels and De Waele 2014) also indicates the interplay between individual and macro-social factors. Such findings are in accordance with general theories on legitimacy in formal social control (e.g., Tyler 2006). For example, right-wing
extremists are insofar ambivalent as they oppose current policies on the one hand,
but call for law and order on the other hand. Successful coping with this ambiguity
seems to have a protective function. Similarly, value complexity can be protective in
migrants who are at risk for extremism (Liht and Savage 2013). These and other
findings resonate with theories of group identity (Tajfel and Turner 1979) and the
protective function of a dual identity against prejudice (Liht and Savage 2013).
Overall, our review of quantitative studies showed various protective factors that
were not only similar to the broader criminological research on violence, but also
consistent across different forms of extremism and radicalization. Self-control and
a basic adherence to law were relevant for right- and left-wing as well as religious/
Resilience against Political and Religious Extremism, Radicalization, and Related…
69
ethnic extremism. Non-violent significant others, positive parenting, and non-­
violent peers also had a protective function against different forms of extremism and
radicalization. Bonding to school and school achievement were only protective for
right- and left-wing extremism, but not for the religious/ethnic form. This finding
indicates different developmental origins and pathways. A basic attachment to society and religion-related factors more specifically fostered protective mechanisms
against religious/ethnic extremism. However, there seems to be no general mechanism because the cultural context was relevant for the respective influence.
Qualitative Studies
Whereas the quantitative studies mostly addressed early phases of radicalization,
the qualitative studies investigated processes of de-radicalization and disengagement after involvement in violent groups and terrorism. The few eligible studies had
been carried out in different countries and on various types of radical groups.
However, there was remarkable consistency in the findings on the main factors that
contributed to disengagement and desistance from violence. The “pull factors” that
helped individuals to desist were partially similar to the protective factors against
extremism and radicalization in the quantitative studies. Ties to or pressure from the
family, positive social relations and experiences, health problems, critical life events
like fatherhood, weighing the costs and benefits of extremist violence, and self-­
reflection on one’s own identity were relevant for disengagement (see Table 2).
These results are in accordance with the more general research on desistance from
crime and violence (Farrall et al. 2011; Sampson and Laub 2003). They are also
similar to what we found in a study on hard-core football hooligans (Lösel and
Bliesener 2006).
The distinction between push and pull factors is not clear-cut (Raets 2017), but
meaningful for practical purposes. They indicate processes of approach and avoidance motivation and may interact with each other. Disillusionment with leaders or
members of the radical group, the methods they used, and other disappointing experiences were the main push factors in our review. These findings support case studies of the process of desisting from terrorism (e.g., Horgan 2009). Push and pull
factors are also plausible from broader theoretical perspectives.
Relations to Various Theories
Due to the available primary research, our review of research on potential “shields
of resilience” could not address specific theories. However, our findings can be
subsumed under various theories of extremism and radicalization. For example, the
family and peer group factors fit to social learning theory (Atkins and Winfree
2017) and also (partially) to strain theory (Agnew 2017). Individual propensities
70
F. Lösel et al.
like self-­control and basic adherence to law and police legitimacy are in accordance with situational action theory (Wikström and Bouhana 2017). The role of
value complexity and perspective taking can be explained by theories on intergroup conflicts and prejudice (Tajfel and Turner 1979; Figueiredo et al. 2014) and
also by theories on social information processing (Dodge and Pettit 2003). The
latter is related to social learning because experiences of violence in social contexts lead to aggression-prone cognitive schemata (Lösel et al. 2007). These and
other middle-range theories are plausible, but scholars rightly plea for more theoretical integration on extremism (Pauwels and De Waele 2014) and criminology in
general (Bruinsma 2016). We agree and see some promising concepts in the abovementioned theories as well as in a General Aggression Model (Anderson and
Bushman 2002; DeWall et al. 2011) that aims to explain how personal and situational factors influence cognitions, feelings, and physiological arousal that, in turn,
affect appraisal and decision processes leading to violent or non-violent behavior.
Bandura’s (1979) integrative approach is also very useful. It explains propensities
for aggression, situational influences, and how reinforcement and self-related cognitions lead to a change or stabilisation of behavior (for an application to politically and otherwise motivated violence, see Lösel et al. 1990). Pauwels and De
Waele (2014) described an integration of constructs from control theory, procedural justice theory, general strain theory, social learning theory, and self-control
theory that can also be applied to protective factors against extremism and
radicalization.
Although these theoretical approaches are promising, the data base on protective factors is still too small to propose general explanations. More theoretical
integration is needed, but so-called “general theories” can also be misleading
(e.g., Lösel 2017). We should be realistic about what can be empirically tested in
an integrative manner. For example, some studies in our review showed that
changes in the ­political situation of a country contributed to disengagement from
terrorism (Ferguson 2016; Reinares 2011). This can be related to decision making
and legitimacy conflicts on the individual level, but the causes for the change on
the macro-level require different theoretical approaches. With regard to the individual development, we propose the concept of accumulated risk and/or protective
factors (Lösel and Bender 2003) that lead to chain reactions into and out of
violence.
Limitations of Our Review
Our review on protective factors provides some systematic knowledge on how
“shields of resilience” against radicalization and violence may function. However,
more high-quality studies on this topic are needed. Therefore, we avoid far-reaching
generalizations.
The number of eligible quantitative studies was moderate and many results could
only be derived from one single project. As in other criminological fields, more
Resilience against Political and Religious Extremism, Radicalization, and Related…
71
replications are necessary (e.g., Lösel 2018). The definitions and operationalisations
of constructs in the studies varied, what led us to mostly adhere to the descriptions
in the primary studies. Some large surveys of student samples defined extremism on
the basis of scale distributions that did not necessarily indicate a strong propensity
for radicalization. Most quantitative studies had a cross-sectional or retrospective
design and therefore cannot provide robust knowledge on developmental processes.
The methods of data collection were mainly self-reports of young people. As different data sources on youth problem behavior show only small to medium correlations (Achenbach 2006; Lösel 2002), cross-validation by other informants would be
welcome. One should also bear in mind that Table 1 and the Appendix only contain
significant results on protective factors. Most quantitative studies investigated other
variables so that a bias of multiple testing may have been possible. As it is difficult
to detect buffering protective factors in criminological research (Loeber and
Farrington 2012; Lösel and Bender 2003), we suggest to see our review more as a
preliminary than definite answer to the question of what protects against extremism
and radicalization.
The qualitative studies in our review also have limitations. We only found a
handful of eligible studies that contained more than single case analyses of desistance from politically or religiously motivated violence. The types of terrorism and
the cultural contexts were heterogeneous, which again requires caution with regard
to generalization. As in the quantitative studies, the main data sources were self-­
reports of the (previously) violent extremists. Although the primary studies found
plausible indicators of disengagement, there remains the question whether it is a
permanent desistance or only a temporary change after imprisonment and/or interventions. However, lapses and relapses are not specific for our topic, but general
issues of desistance from crime.
The qualitative findings could not be tested for statistical significance. Although
there was consistency between the different studies, a systematic comparison is
complicated by sometimes lacking details on sample characteristics, applied methods, and the validity of narratives that were gathered in the interviews.
Practical Conclusions
In spite of the above-mentioned limitations, our findings are relevant for practice.
Studies on extremism and radicalization are often based on official data, publicly
accessible information, or single case analyses. In contrast, most of the studies in
our review directly gathered data from samples of extremist individuals. This is
important for understanding developmental trajectories that are relevant for prevention. Basically, there are two different approaches to prevent extremism and
radicalization:
One group of measures aims for control and suppression, e.g., by the police,
intelligence services, and the criminal justice system, or through technical and other
forms of situational prevention. Our review contains some findings that are relevant
72
F. Lösel et al.
for these approaches. The protective effects of a basic adherence to law, acceptance
of police legitimacy, and criminal prosecution of extremist offenders underline the
importance of consequent state reactions. With regard to imprisonment, there may,
however, be both a deterrent effect and a negative influence by other extremist
inmates. Therefore, it is necessary to carry out thorough assessments and reduce the
influence of radical leaders that differ, for example, in various aspects from Salafist
followers (King et al. 2018).
The second approach to prevention contains psychosocial and educational programs for youngsters in schools, families, and neighborhoods. Other programs are
used by social services, in prisons, or in probation to support the reintegration of
extremist offenders. In this field, the studies in our review support approaches to
strengthen family ties, modify social cognitions, reflect and practice skills that help
to be assertive against extremist group influences, promote perspective taking,
reduce prejudice, and develop a law-abiding dual identity in migrants.
There are numerous developmental prevention programs against crime and
violence that more generally address these factors. The mean effect sizes are positive (Farrington et al. 2017; Lösel 2012), but there is much variation in the outcomes that is not only due to the respective program contents. Therefore,
developmental programs that showed replicated effects should be used to prevent
radicalization, but they should also be evaluated with regard to effective contents
and framing conditions. Specific programs on inter-group prejudice showed
mainly positive effects (Beelmann and Heinemann 2014), but there is also a large
variation in the outcomes. Many programs aim to achieve de-radicalization and
disengagement. Preliminary searches in our PROTON work package suggest that
there are more than 2,000 measures and programs implemented in Europe.
However, there is not yet sound evidence of their effectiveness in well-controlled
evaluations (Armborst and Kober 2017; Beelmann 2017). We are currently working on a European review of well evaluated programs. Our first impression suggests that the recent strong increase of interventions in practice is not yet
accompanied by sound evaluations of these activities. Therefore, we wish to
remind of other experiences in prevention that good intentions are no guaranty for
effectiveness (e.g., McCord 2003).
Appendix
Detailed characteristics of quantitative studies on protective factors against political
and religious extremism and radicalization
Baier et al.
(2016)
Author/
publication
date
Asal et al.
(2008)
Germany
Country
Pakistan
lw
rw
3063
9th
graders
rw
Students
Attitude
Behavior
Attitude
(forbidding child
to join jihadist
movement)
Attitude
Age
range or Type of
M (SD) extremism Outcome
46.19
r/e
Attitude
(14.62)
(permitting child
to join jihadist
movement)
4588
4697
Sample Type of
N
sample
141
Families of
martyrs in the
jihad
Binary logistic
multilevel
regression
Multilevel
linear
regression
Multilevel
linear
regression
Type of
analyses
Logistic
regression
Appreciating parenting
style
β = −.03†
Bonding to school
β = −.09∗∗∗
Good school achievement
β = −.04∗∗
School
Good school achievement
β = −.06∗∗∗
Adherence to law
β = −.33∗∗∗
Good school achievement
OR = 0.70∗
School
School
Family
School
Individual
School
Family
Family
Type of
factor
Family
Bonding to school
β = −.07∗∗∗
Membership in specific
religious groups
b = −1.79† (SE = 1.00)
Ownership of residential
property
b = 1.70∗ (SE = 0.78)
Protective factors
Ownership of residential
property
b = −2.13† (SE = 1.16)
Resilience against Political and Religious Extremism, Radicalization, and Related…
73
Bhui et al.
(2014)
Author/
publication
date
UK
Country
Adolescents
and adults
18–45
r/e
r/e
354
608
lw
Attitude
(sympathy for
terrorism)
Attitude
(condemnation of
terrorism)
Attitude
Behavior
Age
range or Type of
M (SD) extremism Outcome
3033
Sample Type of
N
sample
Binary logistic
multilevel
regression
Multilevel
linear
regression
Multinomial
logistic
regression
Type of
analyses
Low importance of
religion
RR = 0.08∗∗
Low importance of
religion
RR = 0.07∗
Peer group
More social contact/social
networks
RR = 1.52∗∗∗
Illness
RR = 8.81∗∗
Depression
RR = 1.22∗
Low social capital
RR = 0.63∗∗∗
Threatening life events
RR = 0.47†
Individual
Individual
Community/
society
Individual
Individual
Individual
Individual
Individual
Type of
factor
Individual
Adherence to law
β = −.47∗∗∗
Protective factors
Adherence to law
β = −.40∗∗∗
Adherence to law
OR = 0.60∗∗
74
F. Lösel et al.
Country
Feddes et al. The
(2015)
Netherlands
Boehnke
Germany
et al. (1998)
Cragin et al. Palestine
(2015)
Author/
publication
date
Adolescents
Adolescents
600
46
Students
590
Sample Type of
N
sample
16.93
(2.76)
18–30
12–25
r/e
n/s
rw
Path analysis
Type of
analyses
Attitude
Willingness (low
willingness to
engage in violent
protest)
Linear
regression
analysis
Attitude (Opposed MICE-­
to suicide attacks) corrected
regression
Attitude
Age
range or Type of
M (SD) extremism Outcome
Family members not
involved in violence
b = 1.44∗ (SE = 0.22)
Non-violent peers
b = 1.44∗ (SE = 0.22)
Empathy
β = −.41∗
Protective factors
Illness
RR = 0.27†
Migrant of the first
generation
RR = 0.22∗∗
Good school achievement
β = −.19∗∗
Dissatisfaction with
quality of life
b = 1.36† (SE = 0.70)
Anxiety about getting
incarcerated
b = 0.66∗∗ (SE = 0.20)
Incarceration of a family
member
b = 0.96∗∗ (SE = 0.23)
Political disinterest
b = 0.94† (SE = 0.50)
Individual
Peer group
Family
Individual
Family
Individual
Individual
School
Community/
society
Type of
factor
Individual
Resilience against Political and Religious Extremism, Radicalization, and Related…
75
1473
81
USA
UK
Jensen et al.
(2016)
Liht and
Savage
(2013)
1496
USA
Country
Germany
Adolescents
Extremists
Extremists
Sample Type of
N
sample
4367
Students
Jasko et al.
(2016)
Author/
publication
date
Fuchs
(2003)
19.48
(2.14)
34.18
(13.22)
34.24
(13.30)
r/e
mixed
Mixed
Behavior
Behavior
Behavior
Attitude and
behavior
Age
range or Type of
M (SD) extremism Outcome
14–21
rw
Attitude
Multivariate
logistic
regression
model
Pre/post
comparison
Hierarchical
logistic
regression
Type of
analyses
Path analysis
Value complexity
25–50%∗
8.3–22.7%∗
Protective factors
Contact to foreigners
β = −.24∗∗∗
Subjective deprivation of
SES
β = −.08∗∗
Contact to foreigners
β = −.04∗∗
Subjective deprivation of
SES
β = −.05∗∗∗
Significant other not
involved in violence
b = −0.57† (SE = 0.33)
Significant other not
involved in violence
b = −0.57† (SE = 0.29)
Non-violent peers
b = −0.76∗∗ (SE = 0.24)
Non-violent peers
b =− 0.82∗∗∗ (SE = 0.17)
Employment
b = −.56∗∗ (SE = .21)
Individual
Individual
Peer group
Peer group
Family
Family
Individual
Peer group
Individual
Type of
factor
Peer group
76
F. Lösel et al.
van Bergen
et al. (2015)
The
166
Netherlands
Students
15.70
(1.02)
rw
r/e
r/e
16–24
rw
4330
Adolescents
<18 –
>22
lw
4337
Pauwels and Belgium
Svensson
(2017)
Adolescents
Type of
analyses
Path analysis
Willingness
Behavior
Behavior
Behavior
Behavior (violence
towards persons)
Multivariate
logistic
regression
Multivariate
logistic
regression
Multivariate
logistic
regression
SEM
Behavior (violence Blockwise
towards property) multiple
logistic
regression
analysis
Age
range or Type of
M (SD) extremism Outcome
39.90
r/e
Attitude and
(13.40)
behavior
4326
2879
Country
Indonesia
Sample Type of
N
sample
934
Adults
Pauwels and Belgium
De Waele
(2014)
Author/
publication
date
Muluk et al.
(2013)
Community/
society
Individual
Self-control
β = −.32∗∗∗
Basic attachment to
society
β = −.17∗
Individual
Individual
Individual
Individual
Individual
School
Type of
factor
Individual
Self-control
β = −.38∗∗∗
Perceived personal
discrimination
OR = 0.72∗
Acceptance of police
legitimacy
OR = 0.78∗
Self-control
β = −.32∗∗
Protective factors
Intensive religious practice
β = −0.15
Higher educational level
β = −0.14
Acceptance of police
legitimacy
OR = 0.71∗∗
Resilience against Political and Religious Extremism, Radicalization, and Related…
77
The
133
Netherlands
van Bergen
et al. (2016)
Students
15.58
(0.95)
r/e
SEM
SEM
Attitude
Type of
analyses
SEM
Willingness
Age
range or Type of
M (SD) extremism Outcome
15.86
r/e
Willingness
(1.02)
Protective factors
Basic attachment to
society
β = −.05∗
Appreciating parenting
style
β = −.11∗∗
Basic attachment to
society
β = −.17†
Community/
society
Family
Type of
factor
Notes. rw right-wing ideology, lw left-wing ideology, r/e religious/ethnic ideology, n/s nationalist/separatist ideology, SEM structural equation model; if the
authors applied several models in a regression analysis, the reported results always reflect the model in which all variables were included.
†
p < .10, ∗ p < .05, ∗∗ p < .01, ∗∗∗ p < .001
Country
Sample Type of
N
sample
232
Author/
publication
date
78
F. Lösel et al.
Resilience against Political and Religious Extremism, Radicalization, and Related…
79
References
∗ Quantitative studies included in this review
† Qualitative studies included in this review
Achenbach, T. M. (2006). As others see us: Clinical and research implications of cross-informant
correlations for psychopathology. Current Directions in Psychological Science, 15, 94–98.
https://doi.org/10.1111/j.0963-7214.2006.00414.x.
Agnew, R. (2017). General strain theory and terrorism. In G. LaFree & J. D. Freilich (Eds.), The
handbook of the criminology of terrorism (pp. 121–132). Chichester: Wiley-Blackwell.
Altier, M. B., Thoroughgood, C. N., & Horgan, J. G. (2014). Turning away from terrorism. Journal
of Peace Research, 51, 647–661. https://doi.org/10.1177/0022343314535946.
Anderson, C. A., & Bushman, B. J. (2002). Human aggression. Annual Review of Psychology, 53,
27–51. https://doi.org/10.1146/annurev.psych.53.100901.135231.
Armborst, A., & Kober, M. (2017). Effekte von Ansätzen zur Prävention Islamistischer
Radikalisierung: Systematische Übersichtsarbeit zu den Methoden und Ergebnissen von
Studien zur Evaluation von Präventionsansätzen im Bereich Islamismus. Berichte des
Nationalen Zentrums für Kriminalprävention, Nr. 1. [The effectiveness of approaches to prevent islamist radicalization: A systematic review of the methods and results of evaluation studies. Reports of the National Centre of Crime Prevention, No. 1.] Bonn: NZK. Retrieved from
https://www.nzkrim.de/fileadmin/nzk/NZKBerichte/NZK201700101.pdf.
∗Asal, V., Fair, C. C., & Shellman, S. (2008). Consenting to a child's decision to join a Jihad:
Insights from a survey of militant families in Pakistan. Studies in Conflict and Terrorism, 31,
973–994. https://doi.org/10.1080/10576100802400201.
Atkins, J. K., & Winfree, L. T. (2017). Social learning theory and becoming a terrorist: New challenges for a general theory. In G. LaFree & J. D. Freilich (Eds.), The handbook of the criminology of terrorism (pp. 1133–1149). Chichester: Wiley-Blackwell.
Baier, D., Pfeiffer, C., Simonson, J., & Rabold, S. (2009). Jugendliche in Deutschland als Opfer
und Täter von Gewalt [Youth in Germany as victims and perpetrators of violence]. Hannover:
Kriminologisches Forschungsinstitut Niedersachsen. Retrieved from https://kfn.de/wp-content/uploads/Forschungsberichte/FB 107.pdf.
∗Baier, D., Manzoni, P., & Bergmann, M. C. (2016). Einflussfaktoren des politischen Extremismus
im Jugendalter: Rechtsextremismus, Linksextremismus und islamischer Extremismus im
Vergleich [Factors influencing adolescents’ political extremism: Right-wing, left-wing, and
Islamist extremism compared]. Monatsschrift für Kriminologie und Strafrechtsreform [Journal
of Criminology and Penal Reform], 99, 171–198. https://doi.org/10.1515/mkr-2016-0302.
Bandura, A. (1979). Sozial-kognitive Lerntheorie [Social-cognitive learning theory]. Stuttgart:
Klett-Cotta.
Barrelle, K. (2015). Pro-integration: Disengagement from and life after extremism. Behavioral
Sciences of Terrorism and Political Aggression, 7, 129–142. https://doi.org/10.1080/194344
72.2014.988165.
Bartlett, J., & Miller, C. (2012). The edge of violence: Towards telling the difference between
violent and non-violent radicalization. Terrorism and Political Violence, 24, 1–21. https://doi.
org/10.1080/09546553.2011.594923.
Beelmann, A. (2017). Grundlagen einer entwicklungsorientierten Prävention des
Rechtsextremismus. Jena: Friedrich-Schiller-Universität.
Beelmann, A., & Heinemann, K. (2014). Preventing prejudice and improving intergroup attitudes.
A meta-anaylsis of child and adolescent training programs. Journal of Applied Developmental
Psychology, 35, 10–24. https://doi.org/10.1016/j.appdev.2013.11.002.
Berger, J. M. (2016). Promoting disengagement from violent extremism. Terrorism and CounterTerrorism Studies. The Hague: International Centre for Counter-Terrorism. https://doi.
org/10.19165/2016.2.05.
80
F. Lösel et al.
∗Bhui, K., Everitt, B., Jones, E., & Correa-Velez, I. (2014). Might depression, psychosocial adversity, and limited social assets explain vulnerability to and resistance against violent radicalisation? PLoS One, 9, e105918. https://doi.org/10.1371/journal.pone.0105918.
Bjørgo, T. (2011). Dreams and disillusionment: Engagement in and disengagement from militant extremist groups. Crime, Law and Social Change, 55, 277–285. https://doi.org/10.1007/
s10611-011-9282-9.
∗Boehnke, K., Hagan, J., & Merkens, H. (1998). Right-wing extremism among German adolescents: Risk factors and protective factors. Applied Psychology, 47, 109–126. https://doi.
org/10.1111/j.1464-0597.1998.tb00016.x.
Borum, R. (2011). Radicalization into violent extremism II: A review of conceptual
models and empirical research. Journal of Strategic Security, 4, 37–62. https://doi.
org/10.5038/1944-0472.4.4.2.
Bruinsma, G. J. N. (2016). Proliferation of crime causation theories in an era of fragmentation:
Reflections on the current state of criminological theory. European Journal of Criminology,
13, 659–666.
Chernov Hwang, J. (2015). The disengagement of Indonesian jihadists: Understanding the pathways. Terrorism and Political Violence, 29, 277–295. https://doi.org/10.1080/09546553.2015
.1034855.
†Chernov Hwang, J., Panggabean, R., & Fauzi, I. A. (2013). The disengagement of Jihadis in Poso,
Indonesia. Asian Survey, 53, 754–777. https://doi.org/10.1525/as.2013.53.4.754.
Clubb, G. (2015). De-radicalization, disengagement and the attitudes-behavior debate. In
C. Kennedy-Pipe, G. Clubb, & S. Mabon (Eds.), Terrorism and political violence (pp. 258–
266). London: Sage.
Corner, E., & Gill, P. (2015). A false dichotomy? Mental illness and lone-actor terrorism. Law and
Human Behavior, 39, 23–34. https://doi.org/10.1037/lhb0000102.
∗Cragin, R. K., Bradley, M. A., Robinson, E., & Steinberg, P. S. (2015). What factors cause
youth to reject violent extremism? Results of an exploratory analysis in the West Bank. RAND
Corporation. Retrieved from http://www.rand.org/content/dam/rand/pubs/research_reports/
RR1100/RR1118/RAND_RR1118.pdf.
De Waele, M., & Pauwels, L. (2016). Why do Flemish youth participate in right-wing disruptive
groups? In C. Maxson & F. Esbensen (Eds.), Gang transitions and transformations in an international context (pp. 173–200). New York: Springer.
DeWall, C. N., Anderson, C. A., & Bushman, B. J. (2011). The general aggression model: Theoretical
extensions to violence. Psychology of Violence, 1, 245–258. https://doi.org/10.1037/a0023842.
Dodge, K. A., & Pettit, G. S. (2003). A biopsychosocial model of the development of chronic
conduct problems in adolescence. Developmental Psychology, 39, 349–371. https://doi.
org/10.1037/0012-1649.39.2.349.
Doosje, B., Moghaddam, F. M., Kruglanski, A. W., de Wolf, A., Mann, L., & Feddes, A. R. (2016).
Terrorism, radicalization and de-radicalization. Current Opinion in Psychology, 11, 79–84.
https://doi.org/10.1016/j.copsyc.2016.06.008.
Ebner, J. (2017). The rage: The vicious circle of Islamist and far right extremism. London: Tauris.
Farrall, S., Hough, M., Maruna, S., & Sparks, R. (Eds.). (2011). Escape routes: Contemporary
perspectives on life after punishment. Milton Park, UK: Routledge.
Farrington, D. P., Gaffney, H., Lösel, F., & Ttofi, M. M. (2017). Systematic reviews of the effectiveness of developmental prevention programs in reducing delinquency, aggression, and bullying. Aggression and Violent Behavior, 33, 91–106. https://doi.org/10.1016/j.avb.2016.11.003.
∗Feddes, A. R., Mann, L., & Doosje, B. (2015). Increasing self-esteem and empathy to prevent
violent radicalization: A longitudinal quantitative evaluation of a resilience training focused on
adolescents with a dual identity. Journal of Applied Social Psychology, 45, 400–411. https://
doi.org/10.1111/jasp.12307.
Ferguson, N. (2016). Disengaging from terrorism: A Northern Irish experience. Journal for
Deradicalization, 6, 1–23. Retrieved from http://journals.sfu.ca/jd/index.php/jd/article/
view/41/36.
Resilience against Political and Religious Extremism, Radicalization, and Related…
81
Figueiredo, A., Valentim, J. P., & Doosje, B. (2014). Theories on intergroup relations and emotions:
A theoretical overview. Psychologica, 2, 7–33. https://doi.org/10.14195/1647-8606_57-2_1.
∗Fuchs, M. (2003). Rechtsextremismus von Jugendlichen. Zur Erklärungskraft verschiedener
theoretischer Konzepte [right-wing extremism among youth: On the explanatory power
of various theoretical concepts]. Kölner Zeitschrift für Soziologie und Sozialpsychologie
[Cologne Journal of Sociology and Social Psychology], 55, 654–678. https://doi.org/10.1007/
s11577-003-0116-3.
Hammarberg, K., Kirkman, M., & de Lacey, S. (2016). Qualitative research methods: When to
use them and how to judge them. Human Reproduction, 31, 498–501. https://doi.org/10.1093/
humrep/dev334.
Hirschi, T. (1969). Causes of delinquency. Berkeley: University of California Press.
Hirschi, T. (2004). Self-control and crime. In R. F. Baumeister & K. D. Vohs (Eds.), Handbook of
self-regulation: Research, theory, and applications (pp. 537–552). New York: Guilford.
Horgan, J. (2009). Individual disengagement: A psychological analysis. In J. Horgan & T. Bjørgo
(Eds.), Cass series on political violence. Leaving terrorism behind. Individual and collective
disengagement (pp. 17–29). Oxon: Routledge.
∗Jasko, K., LaFree, G., & Kruglanski, A. (2016). Quest for significance and violent extremism:
The case of domestic radicalization. Political Psychology, 1, 195. https://doi.org/10.1111/
pops.12376.
∗Jensen, M., LaFree, G., James, P. A., Atwell-Seate, A., Pisoiu, D., Stevenson, J., & Picarelli, J.
(2016). Final report: Empirical assessment of domestic radicalization (EADR). Report to the
National Institute of Justice, Office of Justice Programs. Washington, DC: U.S. Department of
Justice.
King, S., Bender, D., & Lösel, F. (2017). Instrumente zur Risikobeurteilung extremistisch motivierter Straftäter: Eine Synopse [Instruments for risk assessment of extremist offenders: A synopsis]. In K. Boers & M. Schaerff (Eds.), Kriminologische Welt in Bewegung [Criminology in
motion] (pp. 191–203). Mönchengladbach: Forum Verlag.
King, S., Endres, J., Schwaß, M., Stemmler, M., Lauchs, L., & Armborst, A. (2018). Prisoners
with Islamist relations: Are prisoner files a valuable data source for individual assessment
and for research? International Journal of Developmental Science, 12, 129–141. https://doi.
org/10.3233/DEV-170243.
Kraemer, H. C., Lowe, K. K., & Kupfer, D. J. (2005). To your health: How to understand what
research tells us about risk. Oxford: Oxford University Press.
Kruglanski, A. W., Chen, X., Dechesne, M., Fishman, S., & Orehek, E. (2009). Fully committed:
Suicide bombers motivation and the quest for personal significance. Political Psychology, 30,
331–357. https://doi.org/10.1111/j.1467-9221.2009.00698.x.
Kruglanski, A., Jasko, K., Chernikova, M., Dugas, M., & Webber, D. (2017). To the fringe and
back: Violent extremism and the psychology of deviance. American Psychologist, 72, 217–230.
https://doi.org/10.1037/amp0000091.
∗Liht, J., & Savage, S. (2013). Preventing violent extremism through value complexity: Being Muslim Being British. Journal of Strategic Security, 6, 44–66. https://doi.
org/10.5038/1944-0472.6.4.3.
Lipsey, M. W., & Wilson, D. B. (2001). Practical meta-analysis. Thousand Oaks: Sage Publications.
Loeber, R., & Farrington, D. P. (2012). Advancing knowledge about direct protective factors that
may reduce youth violence. American Journal of Preventive Medicine, 43, 24–27. https://doi.
org/10.1016/j.amepre.2012.04.031.
Lösel, F. (1985). Zur Kontroverse um eine gegenstandsangemessene psychologische Forschung.
Bemerkungen aus der Sicht der Forschungspraxis [On the controversy between quantitative and
qualitative methodology: Comments from the view of research practice]. In W.-F. Kugemann,
S. Preiser, & K. A. Schneewind (Eds.), Psychologie und komplexe Lebenswirklichkeit
[Psychology and complex reality] (pp. 65–91). Göttingen: Hogrefe.
Lösel, F. (2002). Risk/need assessment and prevention of antisocial development in young people:
Basic issues from a perspective of cautionary optimism. In R. Corrado, R. Roesch, S. D. Hart,
82
F. Lösel et al.
& J. Gierowski (Eds.), Multiproblem violent youth: A foundation for comparative research
needs, interventions and outcomes (pp. 35–57). Amsterdam: IOS.
Lösel, F. (2012). Entwicklungsbezogene Prävention von Gewalt und Kriminalität [Developmental
approach to the prevention of violence and delinquency]. Forensische Psychiatrie, Psychologie,
Kriminologie [Forensic Psychiatry, Psychology, Criminology], 6, 71–84. https://doi.
org/10.1007/s11757-012-0159-2.
Lösel, F. (2017). Self-control as a theory of crime: A brief stocktaking after 27/42 years. In
C. Bijlefeld & P. van der Laan (Eds.), Liber amoricum for Gerben Bruinsma (pp. 232–238).
The Hague, NL: Boom.
Lösel, F. (2018). Evidence comes by replication, but needs differentiation: the reproducibility
issue in science and its relevance for criminology. Journal of Experimental Criminology, 14,
257–278.
Lösel, F., & Bender, D. (2003). Protective factors and resilience. In D. P. Farrington & J. Coid
(Eds.), Early prevention of adult antisocial behaviour (pp. 130–204). Cambridge, UK:
Cambridge University Press.
Lösel, F., & Bender, D. (2017). Protective factors against crime and violence in adolescence. In
P. Sturmey (Ed.), The Wiley handbook of violence and aggression. New York: Wiley.
Lösel, F., & Bliesener, T. (2006). Hooliganismus in Deutschland: Verbreitung, Ursachen
und Prävention [Football hooliganism in Germany: Prevalence, origins, and prevention].
Monatsschrift für Kriminologie und Strafrechtsreform [Journal of Criminology and Penal
Reform], 89, 229–245.
Lösel, F., Bliesener, T., & Bender, D. (2007). Social information processing, experiences of aggression in social contexts, and aggressive behavior in adolescents. Criminal Justice and Behavior,
34, 330–347. https://doi.org/10.1177/0093854806295833.
Lösel, F., & Farrington, D. P. (2012). Direct protective and buffering protective factors in the
development of youth violence. American Journal of Preventive Medicine, 43, 8–23. https://
doi.org/10.1016/j.amepre.2012.04.029.
Lösel, F., King, S., Bender, D., & Jugl, I. (2018). Protective factors against extremism and violent radicalization: A systematic review of research. International Journal of Developmental
Science, 12, 89–102. https://doi.org/10.3233/DEV-170241.
Lösel, F., Selg, H., Müller-Luckmann, E., & Schneider, U. (1990). Ursachen, Prävention und
Kontrolle von Gewalt aus psychologischer Sicht [Origins, prevention, and control of violence:
The psychological perspective]. In H.-D. Schwind, J. Baumann, F. Lösel, R. E. Remschmidt,
H.-J. Kerner, et al. (Eds.), Ursachen, Prävention und Kontrolle von Gewalt. Analysen und
Vorschläge der Unabhängigen Regierungskommission zur Verhinderung und Bekämpfung von
Gewalt, Bd. 2. [Report of the German Federal Government’s Commission on origins, prevention, and control of violence] (pp. 1–156). Berlin: Duncker & Humblot.
Luthar, S. S., Cicchetti, D., & Becker, B. (2000). The construct of resilience: A critical evaluation and guidelines for future work. Child Development, 71, 543–562. https://doi.
org/10.1111/1467-8624.00164.
Maskaliūnaitė, A. (2015). Exploring the theories of radicalization. International Studies.
Interdisciplinary Political and Cultural Journal, 17, 9–26. https://doi.org/10.1515/
ipcj-2015-0002.
Masten, A. S. (2016). Resilience in developing systems: The promise of integrated approaches.
European Journal of Developmental Psychology, 13, 297–312. https://doi.org/10.1080/17405
629.2016.1147344.
McCord, J. (2003). Cures that harm: Unanticipated outcomes of crime prevention programs. The
Annals of the American Academy of Political and Social Science, 587, 16–30. https://doi.
org/10.1177/0002716202250781.
Meloy, J. R., & Genzman, J. (2016). The clinical threat assessment of the lone-actor terrorist. The
Psychiatric Clinics of North America, 39, 649–662. https://doi.org/10.1016/j.psc.2016.07.004.
Monahan, J. (2017). The individual risk assessment of terrorism. In G. LaFree & J. D. Freilich (Eds.),
The handbook of the criminology of terrorism (pp. 520–534). Chichester: Wiley-Blackwell.
Resilience against Political and Religious Extremism, Radicalization, and Related…
83
∗Muluk, H., Sumaktoyo, N. G., & Ruth, D. M. (2013). Jihad as justification: National survey
evidence of belief in violent jihad as a mediating factor for sacred violence among Muslims
in Indonesia. Asian Journal of Social Psychology, 16, 101–111. https://doi.org/10.1111/
ajsp.12002.
Nesser, P. (2016). Islamist terrorism in Europe: A history. New York: Oxford University Press.
∗Pauwels, L. J., & De Waele, M. (2014). Youth involvement in politically motivated violence: Why
do social integration, perceived legitimacy, and perceived discrimination matter? International
Journal of Conflict and Violence, 8, 134–153. https://doi.org/10.4119/UNIBI/ijcv.379.
Pauwels, L. J., & Heylen, B. (2017). Perceived group threat, perceived injustice, and self-reported
right-wing violence: An integrative approach to the explanation right-wing violence.Journal
of Interpersonal Violence, 0886260517713711. https://doi.org/10.1177/0886260517713711.
∗Pauwels, L. J. R., & Svensson, R. (2017). How robust is the moderating effect of extremist beliefs
on the relationship between self-control and violent extremism? Crime and Delinquency, 63,
1000–1016. https://doi.org/10.1177/0011128716687757.
Perry, S., Weisburd, D., & Hasisi, B. (2017). The ten commandments for effective counterterrorism. In G. LaFree & J. D. Freilich (Eds.), Wiley handbooks in criminology and criminal justice.
The handbook of the criminology of terrorism (pp. 482–494). Wiley-Blackwell: Chichester,
UK.
Popay, J., Rogers, A., & Williams, G. (1998). Rationale and standards for the systematic review
of qualitative literature in health services research. Qualitative Health Research, 8, 341–351.
https://doi.org/10.1177/104973239800800305.
Pressman, D. E., & Flockton, J. (2012). Calibrating risk for violent political extremists and terrorists: The VERA 2 structured assessment. The British Journal of Forensic Practice, 14, 237–
251. https://doi.org/10.1108/14636641211283057.
Raets, S. (2017). The we in me: Consiering terrorist desistance from a social identity perspective.
Journal for Deradicalization, 2017/18, 1–27. Retrieved from http://journals.sfu.ca/jd/index.
php/jd/article/view/122/100.
Rahimullah, R. H., Larmar, S., & Abdalla, M. (2013). Understanding violent radicalization
amongst Muslims: A review of the literature. Journal of Psychology and Behavioral Science, 1,
19–35. Retreived from https://search.ror.unisa.edu.au/?redirect=http://researchoutputs.unisa.
edu.au/11541.2%2f122231.
Raine, A. (2013). The anatomy of violence: The biological roots of crime. New York: Pantheon
Books.
Reinares, F. (2011). Exit from terrorism: A qualitative empirical study on disengagement and
deradicalization among members of ETA. Terrorism and Political Violence, 23, 780–803.
­https://doi.org/10.1080/09546553.2011.613307.
Rettenberger, M. (2016). Die Einschätzung der Gefährlichkeit bei extremistischer Gewalt und
Terrorismus. [Risk assessment in cases of extremist violence and terrorism]. Kriminalistik
[Criminalistics], 8–9, 532–537.
Royal College of Psychiatrists. (2016). Counter-terrorism and psychiatry. London: Royal College
of Psychiatrists.
Rutter, M. (2012). Resilience as a dynamic concept. Development and Psychopathology, 24, 335–
344. https://doi.org/10.1017/S0954579412000028.
Sageman, M. (2014). The stagnation in terrorism research. Terrorism and Political Violence, 26,
565–580. https://doi.org/10.1080/09546553.2014.895649.
Sageman, M. (2017). Turning to political violence: The emergence of terrorism. Philadelphia:
University of Pennsylvania Press.
Sampson, R. J., & Laub, J. H. (2003). Shared beginnings, divergent lives: Delinquent boys to age
70. Cambridge, MA: Harvard University Press.
Sarma, K. M. (2017). Risk assessment and the prevention of radicalization from nonviolence into
terrorism. American Psychologist, 72, 278–288. https://doi.org/10.1037/amp0000121.
Sawyer, J. P., & Hienz, J. (2017). What makes them do it? Individual-level indicators of extremist
outcomes. In G. LaFree & J. D. Freilich (Eds.), Wiley handbooks in criminology and criminal
justice. The handbook of the criminology of terrorism (pp. 47–61). Chichester: Wiley-Blackwell.
84
F. Lösel et al.
Scarcella, A., Page, R., & Furtado, V. (2016). Terrorism, radicalisation, extremism, authoritarianism and fundamentalism: A systematic review of the quality and psychometric properties of
assessments. PLoS ONE, 11, e0166947. https://doi.org/10.1371/journal.pone.0166947.
Schmid, A. (2004). Terrorism – the definitional problem. Case Western Reserve Journal of
International Law, 36, 375–420.
Schmid, A. (2012). The revised academic consensus definition of terrorism. Perspectives on
Terrorism, 6, 158–159. Retrieved from https://www.terrorismanalysts.com/pt/index.php/pot/
article/view/193.
Schmucker, M., & Lösel, F. (2011). Meta-analysis as a method of systematic reviews. In D. Gadd,
S. Karstedt, & S. F. Messner (Eds.), The sage handbook of criminological research methods
(pp. 425–443). Thousand Oaks: Sage.
Shapland, J., Bottoms, A., & Grant, M. (2012). Perception of the criminal justice system among
young adult would-be desisters. In F. Lösel, A. E. Bottoms, & D. P. Farrington (Eds.), Young
adult offenders: Lost in transition? (pp. 128–145). Milton Park: Routledge.
Silke, A. (2001). The devil you know: Continuing problems with research on terrorism. Terrorism
and Political Violence, 13, 1–14. https://doi.org/10.1080/09546550109609697.
Strom, K. J., Hollywood, J. S., & Pope, M. W. (2017). Terrorist plots the United States: What we
have really faced, and how we might best defend against it. In G. LaFree & J. D. Freilich (Eds.),
Wiley handbooks in criminology and criminal justice. The handbook of the criminology of terrorism (pp. 468–481). Wiley-Blackwell: Chichester.
Tajfel, H., & Turner, J. C. (1979). An integrative theory of intergroup conflict. In W. G. Austin
& S. Worchel (Eds.), The social psychology of intergroup relations (pp. 33–48). Monterey:
Brooks/Cole.
Ttofi, M. M., Farrington, D. P., Piquero, A. R., Lösel, F., DeLisi, M., & Murray, J. (2016).
Intelligence as a protective factor against offending: A meta-analytic review of prospective longitudinal studies. Journal of Criminal Justice, 45, 4–18. https://doi.org/10.1016/j.
jcrimjus.2016.02.003.
Tyler, T. R. (2006). Why people obey the law. Princeton: Princeton University Press.
∗van Bergen, D. D., Ersanilli, E. F., Pels, T. V. M., & de Ruyter, D. J. (2016). Turkish-Dutch
youths’ attitude toward violence for defending the in-group: What role does perceived parenting play? Peace and Conflict: Journal of Peace Psychology, 22, 120–133. https://doi.
org/10.1037/pac0000173.
van der Heide, L., & Huurman, R. (2016). Suburban bliss or disillusionment: Why do terrorists
quit? Journal for Deradicalization, 8, 1–24. Retrieved from http://journals.sfu.ca/jd/index.php/
jd/article/view/64.
∗van Bergen, D. D., Feddes, A. F., Doosje, B., & Pels, T. V. (2015). Collective identity factors and
the attitude toward violence in defense of ethnicity or religion among Muslim youth of Turkish
and Moroccan Descent. International Journal of Intercultural Relations, 47, 89–100. https://
doi.org/10.1016/j.ijintrel.2015.03.026
Walburg, C. (2014). Migration und Jugenddelinquenz: Mythen und Zusammenhänge. Ein
Gutachten im Auftrag des Mediendienst. [Migration and youth delinquency: Myths and correlations. An expert statement prepared for the media service.] Retrieved from Institut für
Kriminalwissenschaften, Universität Münster website: https://mediendienst-integration.de/fileadmin/Dateien/Gutachten_Kriminalitaet_Migration_Walburg.pdf
Webber, D., & Kruglanski, A. W. (2017). Psychological factors in radicalization: A "3N" approach.
In G. LaFree & J. D. Freilich (Eds.), Wiley handbooks in criminology and criminal justice. The
handbook of the criminology of terrorism (pp. 33–46). Wiley-Blackwell: Chichester.
†Weine, S., & Ahmed, O. (2012). Building resilience to violent extremism among Somali –
Americans in Minneapolis: Final report to human factors/behavioral sciences division, science
and technology directorate, U. S. department of Homeland Security.
Wikström, P.-O. H., & Bouhana, N. (2017). Analyzing radicalization and terrorism: A situational
action theory. In G. LaFree & J. D. Freilich (Eds.), The handbook of the criminology of terrorism (pp. 175–186). Chichester: Wiley-Blackwell.
Terrorist Recidivism in Israel: Rates,
Patterns and Risk Factors
Tomer Carmel, Michael Wolfowicz, Badi Hasisi, and David Weisburd
Introduction
The potential for terrorism offenders to re-offend is a key concern for western countries. In the coming years hundreds of terrorism offenders are set to be released in
the US, UK, Europe, and elsewhere. Despite the many advances made in the study
of de-radicalization and desistance, it remains that little is known about terrorist
recidivism. Statistics on terrorist recidivism are hard to come by and are largely
anecdotal. Additionally, little work has been done to examine which factors may
predict terrorist recidivism (Pluchinsky 2008; Silke and Veldhuis 2017).
The study of recidivism generally considers the rate at which released offenders
return to criminality. Depending on the study, recidivism is examined by whether
offenders have been re-arrested, re-convicted, or re-incarcerated. The majority of recidivism research considers offenders to be recidivists regardless of the nature of index
offence or the new offence. That is, involvement in any new offence—regardless of
how it is measured—post-release is considered a marker of recidivism. Such an
approach does not address the specific concerns regarding terrorist recidivism. Rather
than being interested in whether a released terrorism offender may engage in some lowlevel criminal activity, the interest of terrorist recidivism relates to the possibility of
terrorism offenders returning to terrorism. While it has been suggested that we can
learn much about terrorist recidivism and its risk factors from the study of criminal
recidivism, it remains that little work has been done in this area (Altier et al. 2012, 2014).
T. Carmel · M. Wolfowicz (*) · B. Hasisi
Institute of Criminology, Faculty of Law, Hebrew University of Jerusalem, Jerusalem, Israel
e-mail: michael.wolfowicz@mail.huji.ac.il
D. Weisburd
Institute of Criminology, Faculty of Law, Hebrew University of Jerusalem, Jerusalem, Israel
Department of Criminology, Law and Society, George Mason University,
Fairfax, Virginia, USA
© Springer Nature Switzerland AG 2020
D. Weisburd et al. (eds.), Understanding Recruitment to Organized Crime
and Terrorism, https://doi.org/10.1007/978-3-030-36639-1_4
85
86
T. Carmel et al.
The study of terrorist recidivism is therefore the study of recidivism to the same
offence type. However, such study is difficult given the rarity of this type of offending, and as such the low base-rates, as well as the overly long or short observation
periods that are characteristic of terrorism research more broadly. Some studies may
be criticized for examining recidivism over time periods and decades that are disconnected, such as the 1950’s and the post-9/11 era. Others may only include a short
observation period of a few years, which does not allow enough time for offenders
to display recidivism (van der Heide and Schuurman 2018). As a result of these
issues, what little data does exist regarding base-rates for terrorist recidivism is
often questionable.
Like other areas of terrorism research, Israel may be able to serve as an important
case study. Of all democratic countries, Israel suffers the greatest frequency of terrorism. As a result, Israel has incarcerated tens of thousands of ‘security
offenders‘over the last few decades, charged with a variety of violent and non-­
violent terrorism-related offences. In this chapter we analyze data provided by the
Israel Prison Service on all security offenders processed between 2004 and 2017.
The large sample size and long observational period enable us to provide a comprehensive analysis of terrorism-specific recidivism, and key risk factors known to
affect recidivism.
Terrorist Recidivism
The literature from criminology shows that recidivism rates vary greatly depending
on the measure used. Generally speaking, recidivism research looks at re-arrests,
re-convictions, or re-incarcerations for any offence. However, some studies consider recidivism—using one or more of these measure—to the same type of offence
as the most important measure of recidivism (Waldo and Griswold 1979). The study
of recidivism to the same offence type typically relates to the study of offender specialization and versatility.
While it is difficult to summarize this literature, it has generally been found that
offenders are quite versatile (Piquero et al. 2012; Wiesner, Yoerger and Capaldi
2018). However, when comparing recidivism rates for recidivism to the same
offence, there are large differences between different types of offenders. For example, sex offenders, who are often the subject of such inquiry, are often found to
lower levels of specialization and recidivism than other offenders. However, when
disaggregating into rarer offences, such as rape, higher levels of specialization and
recidivism may be found (Miethe, Olson and Mitchell 2006). As Prentky, Lee,
Knight and Cerce (1997) point out in their study of sex offenders over a 25-year
period, had their analysis been limited to the traditional 5-year timeframe, they
would have missed around 20 of the same offence recidivism cases. Similarly, in the
only known study to examine risk factors for terrorist recidivism, Fahey (2013)
found that only time at risk (time since release) was a significant predictor of recidivism. As such there is a need for longer observation periods in the study of recidivism to the same offence for this rare offence type.
Terrorist Recidivism in Israel: Rates, Patterns and Risk Factors
87
Statistics on terrorist recidivism are hard to come by and estimates can vary
widely (Clifford 2018). A recent study of U.S. domestic terrorism offenders found
a recidivism rate of only 1.6% (Hodwitz 2019). Another recent study found that
among terrorism offenders in the Netherlands, between 2008–2012 the recidivism
rate was 4.6% (van der Heide and Schuurman 2018). These numbers are quite close
to the oft cited statistic that only about 2–3% of Irish Republican terrorism offenders released in the Good Friday Agreements recidivated to terrorism related offending (Silke 2014). However, not all estimates are so low, with the most recent
Department of National Security report estimating that 30% of released Guantanamo
Bay detainees had recidivated to terrorism. A similar rate was found among terrorism offenders in Israel between 2008–2012. However, our recent study on Jerusalem
found that the rate was closer to 60% (Hasisi et al. 2019), almost identical to the rate
identified in a recent study of 170 terrorism offenders from the U.S (Altier et al.
2019). Interestingly, these larger rates are quite similar to the estimated rate of
recidivism among German right-wing extremist offenders (Weilnböck, 2012).
Different statistics that are also relevant to the inquiry into terrorist recidivism
can be found among other groups of offenders as well, for example, returning foreign fighters who subsequently were involved in domestic terrorism cases. While it
has been found that among returning foreign fighters in western countries the rate is
about 11% (Hegghammer 2013), the numbers were much higher in Indonesia and
Algeria in the 1980–1990s, at 40 and 90% respectively (Cragin 2017). Similarly,
statistics derived from follow-ups of participants in de-radicalization programs
show that recidivism rates have similar ranges, from 10% in Saudi Arabia to around
50% in both Yemen and Morocco (Hasisi et al. 2019).
There are a number of possible explanations as to why there is a such a wide
range of recidivism rates, seemingly wider than rates for ordinary crime. Recidivism
rates could be high when the specific socio-political environment and context is one
in which extremism is pervasive, where there is a large support base, and where
capable organizations operate (Bélanger 2017; Speckhard, Shajkovci and
Yayla 2017). This may explain why attacks in Northern Ireland subsided after the
“Good Friday Agreement“, whilst they increased in Israel following the Oslo
Accords (Masters 2004). In fact, many of the leaders of the post-Oslo Intifada, and
perpetrators of serious attacks over the next decade were recidivist terrorists (Samuel
1998; Ganor and Falk 2013). High recidivism rates can also be the result of increased
surveillance and policing which give extra attention to released terrorism offenders.
In most countries, several security agencies (including the criminal justice system)
are involved in detecting and thwarting terror activity, much more than effort allocated to cope with criminal activity. Low recidivism rates could therefore be the
result of a lack of surveillance, and the failure of security services to detect recidivism (Bélanger 2017; Porges 2010).
In some cases, low observed recidivism rates may not reflect deterrence but
rather an incapacitation effect, whereby offenders receiving longer sentences have
less of an opportunity to recidivate during the observation period, or are less likely
to recidivate due to their older age at their time of release (Meade et al. 2013; Owens
2009). While this assumption may apply to some terrorism offences, the majority of
terrorism offences are non-violent, and average sentence lengths may be only a few
88
T. Carmel et al.
years.1 Since it is difficult to disentangle the incapacitation and deterrent effects,
prevention efforts should seek to combine incapacitation and deterrent elements to
decrease recidivism to terrorism over time. Saudi Arabia takes such an approach,
where in addition to stiff sentencing, its post-release surveillance has been credited
for its deterrent effect and contribution to low recidivism rates (Hasisi et al. 2019).
The Saudi Arabian case also highlights the role of structures of opportunities for
released terrorists. Whether or not an individual will desist from terrorism or recidivate is dependent on the availability of different opportunities that are more conducive
to desistance, or recidivism. For example, Bjørgo (2008) identifies a range of pull and
push factors that increase the likelihood of desistance. Push factors include societal
and familial disapproval, while pull factors—which are believed to have a stronger
potential influence—include educational, employment and family building opportunities. Individuals may also seek to desist from terrorism when—like crime—they perceive their continued involvement as jeopardizing their extra-­terroristic social and
familial bonds. As such, when policies and programs promote these pull and push
factors post-release, the likelihood of recidivism is reduced. Where these factors are
weakly promoted, or not promoted at all, then the structure of opportunities conducive
to recidivism may be stronger, and thereby the likelihood of recidivism is greater
(Altier et al. 2014). Similar findings have been made with regards to ordinary criminals, and those involved in organized crime in particular (Stys & Ruddell, 2013).
While scholars have theorized that terrorist recidivism rates are likely to be lower
than those for ordinary crime (Silke 2014; Bovenkerk 2011), some have referred to
rates as low as a few percent as ‘suspicious’ (Horgan and Braddock 2010). It is
known that low base rates and inadequate observational periods, which affect much
of terrorism research, impact the development of reliable recidivism rates (Gill et al.
2016). Recidivism rates derived from evaluations of prison-based programs may
also be problematic. These programs often involve volunteer participation with high
motivation to redeem and therefore do not report recidivism on non-participants,
who are often the most radical (Pettinger 2017). As such, these evaluations also do
not provide base-rates of recidivism. Rather, base rates must be developed from
large samples, over longer observation periods, ideally in the absence of any specific rehabilitation programming.
Risk Factors for Recidivism to Terrorism Offending
While Fahey’s (2013) study of Guantanamo Bay detainees, found that only time at
risk (time since release) significantly predicted recidivism, the results highlight the
possibility that terrorist recidivism may be affected by known risk factors for ordiAccording to information presented in the annual Terrorism Situation and Trend Report
(TE-STAT) published by Europol, the average sentence lengths in countries such as the UK,
Germany, and France range from 4–9 years depending on the year of the report. Sentences for terrorism offences are notoriously short in fact (Chesney 2007), and can be made shorter based on the
offence stemming from a sting operation (Norris 2019), or conviction stemming from plead bargaining (De Kerchove and Höhn 2016).
1
Terrorist Recidivism in Israel: Rates, Patterns and Risk Factors
89
nary criminal recidivism. However, while many similarities exist between criminals
and terrorists, there are also important differences and recidivism risk assessment
tools need to be tailored for terrorism offending (Kebbell and Porter 2012; Dernevik
et al. 2009). While the literature on criminal recidivism has identified a range of key
risk factors, it also highlights that such factors may operate differently, or have differential effects depending on the outcome being measured.
In this regard, one of the most commonly examined risk factors is also one of the
most controversial, namely sentence length. There is however a debate in the literature as to whether longer sentence lengths have a deterrent effect or a risk effect, and
the evidence is quite mixed on this issue (Mears, Cochran and Cullen 2015; Rydberg
and Clark 2016; Mitchell et al. 2017; Liem 2013), especially when controlling for
offence type (Rydberg and Clark 2016). It remains unknown as to how sentence
length may affect terrorist recidivism. Sentences for terrorism offences are often
quite short, on account of the fact that most sentences are for non-violent offences,
or include a broad variety of offences (Chesney 2007). However, longer sentence
lengths mean that offenders will be older when they are released, giving them more
time to naturally ‘age out’ of offending (Spivak and Damphousse 2006). This is one
explanation for why longer sentences are often associated with a reduced likelihood
of recidivism. But the effects of aging go beyond this, since as an individual age, life
changes, such as attainment of an academic degree, employment, marriage, and the
baring of children may occur.
Marriage in particular—and children—place new obligations upon an individual, which often include the need to maintain steady employment. However, the
quality of marriage matters. Recent, or weak marriages may not have had the time
to develop into the type of relationship that acts as a protective factor. The quality of
marriage may be especially pertinent in the case of terrorism, since an encouraging
spouse who shares the extremist ideology may increase the likelihood of offending
(Altier, Boyle and Horgan 2019; Silke 2008). Studies of Jihadists have found that
the majority were married, and had children (Bakker 2006; Sageman 2004).
Additionally, Berrebi (2007) found that 45% of Palestinian terrorists were married,
although this number was lower than that of the general population (59%). In a
study of homegrown Jihadists in the US, 20% were found to be married to an
extremist spouse (Klausen et al. 2018). The authors state that “marriage is tied to
status and martyrdom, and it is a frequent precursor to violent action” (p. 4). As
such, marriage may be one factor that operates differently for terrorists and ordinary
criminals (Mullins 2010; Silke 2008).
The high rate of marriage among terrorists may be reflective of the fact that these
offenders tend to be somewhat older than ordinary criminals (Pyrooz, LaFree,
Decker and James 2018). For instance, non-violent terrorism offenders, who make
up the largest group of offenders, tend to be older than violent offenders (Klausen,
Morrill and Libretti 2016; Harms 2017; Perliger et al. 2016). Additionally, Islamic
extremist offenders are more likely to be married than right-wing or left-wing
extremists (Gill, Horgan and Deckert 2014; Chermak and Gruenewald 2015). This
is probably related to the different social & cultural contexts in which they come
from, with more traditional and religious communities encouraging marriage at
younger ages (Silke 2008).
90
T. Carmel et al.
An additional factor that has often been highlighted in the literature is organizational affiliation. For example, the literature on recidivism has found that gang
members are at a heightened risk for recidivism compared to non-gang members
(Dooley et al. 2014). Additionally, many of the recidivists from Guantanamo Bay
were affiliated with known terrorist organizations, where ideology and social network play important role in maintaining the strength and resilience of terrorist
groups. Indeed, Hasisi et al. (2019) found that among terrorism offenders from
Jerusalem, organizational affiliation with one of the major Palestinian organizations
was associated with an increased risk of recidivism. Like in other places, such as the
Philippines, even members of organizations actively involved in peace efforts and
diplomacy may continue to carry out acts of terrorism, and recognized organizations may splinter into new groups, or leave behind semi-autonomous wings. In the
context of the Palestinian organizations, whilst Fatah has formerly renounced terrorism, many factions still flying its banner have refused to do so and continue to
support, promote, and carry out militant activities (Shikaki 2004). Many of its activists have continued to be involved inviolence, including terrorism (Høigilt 2016).
The Current Study
The current study takes advantage of a large dataset of offenders who were incarcerated for terrorism related ‘security offences‘in Israel over a 13-year period
(2004–2017) and examines the characteristics of recidivism to security offending.
There are no de-radicalization or desistance treatment programs for security prisoners in the IPS. Rather, security prisoners were afforded opportunities to engage in
higher education through the Open Universities program.
Methods
Data
The data for this study was obtained from the Israel Prison Service (IPS) who is in
charge of the incarceration of all terrorist offenders, defined as those who “committed an obvious attack on national security or other illegal activities related to
­nationalistic ideology” (Hasisi et al. 2019). These prisoners are classified by the IPS
as “security prisoners” according to the conclusions of the Israeli Security Agency
(ISA). The data included information about all security prisoners who had been
processed for incarceration by the IPS during the years 2004–2017. Prior to 2004,
most security prisoners had been incarcerated by the Israeli Military Police.
However, prison reforms shifted the responsibility for security prisoners to the IPS,
who have since maintained responsibility for all criminal and security prisoners. As
Terrorist Recidivism in Israel: Rates, Patterns and Risk Factors
91
such, from 2004 onwards all data collection, storage and processing for both security and criminal offenders was placed under a centralized and uniform system. To
ensure consistency of the data, this study included only those prisoners who were
incarcerated during or after 2004 and offenders whose first incarcerations occurred
prior to 2004 were removed from analysis.
The data included both incarceration and individual level risk factors that are
known to affect criminal recidivism: age at first incarceration, age at time of release,
length of full sentence as well as length of actual incarceration, terrorist organization affiliation and marital status. In addition, offence type classification for each
incarceration was coded and included: public disorder, assault, murder and manslaughter and national security. National security offences generally relate to
offences such as possession/manufacture of weapons, possession of weapons, affiliation with proscribed organizations, or contact with foreign agents. Public disorder
offences most commonly related to violent rioting and other forms of low intensity
violence such as rock throwing, road blocking etc. Other types of crimes, such as
property, sex and fraud, were categorized as “other”.
The dataset consisted of 26,667 individual offenders that had been incarcerated
and convicted for at least one security offence. Of these, 25,253 were from the West
Bank, 1414 were from Jerusalem. Combined they were imprisoned for a total of
31,335 terms, with an average of 1.18 incarcerations per individual. 27 of the prisoners in the sample were female, and 37 were Jewish. Since none of the Jewish or
female prisoners that were released prior to data collection were re-incarcerated for
security offenses, they were not included in the analysis.
Variables
The study aimed to test the impact risk factors that are known to affect criminal
recidivism by examining the re-incarceration of security prisoners for terrorism
related charges after release. Most of the sample lives under the jurisdiction of the
Palestinian Authority. When approached by the researchers, the PA law enforcement agency refused to give any information regarding the criminal activity of subjects included in our sample. Because the information regarding criminal activity of
the majority of the sample was incomplete, it was excluded also from analysis.
History of prior security convictions Having a history of security incarcerations
greatly affects the risk of recidivism (Hasisi et al. 2019). Hence, the number of prior
incarcerations as a security prisoner was included in this study as well. It was impossible for the researchers to obtain information regarding the criminal history of
security prisoners that live under the jurisdiction of the Palestinian Authority. Since
most of our sample might have missing criminal records, any ordinary criminal
incarcerations in the sample were removed from analysis, and the effects criminal
history were not explored here.
92
T. Carmel et al.
Age at time of release The IPS data includes the release date of each incarceration
as well as the prisoner’s date of birth. As such, we calculated age at time of release
based on this data. To disentangle age and history of incarceration, age at time of
release was tested only for first incarceration.
Length of sentence served Similar to the length of the sentence, length of sentence
served is a calculation of the number of weeks the prisoner was held in prison.
Unlike the length of sentence, that is strictly based on the ruling of the court, the
length of sentence served is based on the actual term of imprisonment. The length
of the sentence served cannot be longer than the length of the sentence ruled. As
such, both correlate. Yet, from time to time, agreements between the Israeli government and the Palestinian Authority or the Hamas can result in release of security
prisoners before their term. A major event, when a thousand prisoners were released
at once, occurred during the period of the study. Thus, correlation between time
sentenced and time served is not as strong as one might expect.
Offence type Offence type was categorized according to the index used by the
IPS and Israel Police. Categories used were national security, public disorder,
assault, murder and manslaughter, sex, vice and property. National security
offences generally relate to offences such as possession/manufacture of weapons,
possession of weapons, affiliation with proscribed organizations, or contact with
foreign agents. Public disorder offences most commonly related to violent rioting
and other forms of low intensity violence such as rock throwing, road blocking etc.
Crimes that did not fit into one of the above categories were coded as “other”. One
incarceration might relate to several types of crime, whether since the act included
more than one offense or whether the incarceration is due to several independent
acts. Hence, each category was indexed using a dummy variable, to account for
this scenario.
Organizational affiliation Many security prisoners are known to be affiliated with
one of the primary organizations linked to the Israeli-Palestinian conflict. Such affiliation was provided by the IPS, based on the identification done by the prisoners
themselves and assessment of the Israeli Security Agency.
Marital status During the time of the study, the IPS was provided with information about the marital status of the prisoners by the prisoners themselves. Although
the information is self-reported, it is regarded as reliable, since it reflects on the
rights of the immediate family of the prisoner for visitations. In many cases in the
sample, the family lives under the jurisdiction of the Palestinian Authority and is
required to be registered and authorized for visitation, contributing further for the
validity of the information regarding the prisoners’ immediate family. In order to
protect the privacy of the prisoners, the IPS provided marital status in three categories only: Single/never married, married, or divorced or widowed. Prisoners
who refused to provide marital status (7.2% of the sample) were categorized as
“unknown”.
93
Terrorist Recidivism in Israel: Rates, Patterns and Risk Factors
Analysis
Overall recidivism rates were assessed using the Kaplan-Meier method (Kaplan and
Meier 1958). For the effects of risk factors over terrorist recidivism a specific cutoff
of recidivism after 5 years from release was used. As recidivism rates in Israel are
slow to reach an asymptote, the IPS recommends using 5-years recidivism as a
yardstick for measuring recidivism (Ben-Zvi and Walk 2011).
Results
Recidivism Rates
The sample demonstrated a relatively modest recidivism rate, reaching 6.8%, 14.1%
and 17.3% 1-year, 3-year and 5-year rates, respectively (Fig. 1). The shape of the
recidivism curve is a logarithmic function that follows the general pattern for ordinary criminal recidivism, although recidivism of security prisoners was lower than
general criminal recidivism in Israel (Walk and Berman 2015).
History of Prior Security Convictions
Similar to the criminal recidivism literature, prior incarcerations for terrorism-­
related offences increase the risk of recidivism. While only 16.3% of prisoners without prior incarcerations recidivate 5 years after release, the rate is almost double for
Recidivism to security incarceration
25%
20%
15%
10%
5%
0%
0
1
2
3
4
5
6
Years after release
Fig. 1 Overall recidivism rates by year after release
7
8
9
10
94
T. Carmel et al.
Recidivism to security offences
40%
35%
30%
Prior security
incarcerations
25%
2
20%
1
15%
0
10%
5%
0%
0
2
4
6
8
10
Years after release
Fig. 2 Recidivism rates by year after release according to number of prior incarcerations as security prisoners
those with 2 prior incarcerations, at 30.4%. Similarly, prisoners with prior incarcerations tend to be re-incarcerated faster than those without such history. These
patterns are similar to what is observed in ordinary criminal recidivism (Fig. 2).
Age at Time of Release
Age at time of release ranged between 14.5 and 68.8 years of age, averaging at 24
(SD = 6.33). 11.9% of the sample were legally minor, being younger than 18 years
old, whilst only 6.2% of the sample were older than 35 years old. As depicted below
(Fig. 3), recidivism to another security incarceration was highest for those released
at a younger age. The rate dropped significantly with age, reaching an asymptote as
early as age 27.
Age at First Incarceration
Since the majority of the sample were not recidivists, and only had one incarceration, age at first incarceration was very similar to age at release, averaging at 21.9
(SD = 5.53). The trend also follows a similar pattern to age at release. Most of the
sample were first incarcerated as juveniles (17.9% of the sample) or young adults
(79.2% of the sample), and only 2.9% were incarcerated over the age of 35 (see
Fig. 4).
95
Terrorist Recidivism in Israel: Rates, Patterns and Risk Factors
Recidivism to another security
incarceration
45%
40%
35%
30%
25%
20%
15%
10%
5%
0%
15
20
25
30
35
40
45
50
55
60
Age at time of release
Fig. 3 5-year recidivism to security incarceration by age at time of release. Error bars represent
standard errors
Recidivism to security incarceration
50%
45%
40%
35%
30%
25%
20%
15%
10%
5%
0%
15
20
25
30
35
40
45
50
Age at first incarceration
Fig. 4 5-year recidivism to security incarceration by age at first incarceration. Error bars represent
standard errors
Length of Sentence Served
In our sample, the length of sentence served had a complex impact on recidivism
(Fig. 5). The length of sentences of up to 7 years reduced recidivism, while the
effect of sentences longer than 7 years did not continue this trend. Although
­sentences longer than 7 years show a slight increase in recidivism compared to the
7 years long sentences, recidivism maintains under the high rates of short sentences.
T. Carmel et al.
25%
30%
Recidivism to security incarceration
Recidivism to security incarceration
96
25%
20%
15%
10%
5%
0%
0
13
26
39
52
65
78
91 104
Length of served sentence (weeks)
Up to two years
20%
15%
10%
5%
0%
2
4
6
8
10
Length of served sentence (years)
Fig. 5 5-year recidivism to security incarceration by length of sentence served up to 2 years (left
panel, in weeks) and over 2 years (right panel, in years)
Table 1 Recidivism by type
of current offense. Specific
incarcerations can be counted
several times due to being
related to more than one
offense type
Offence type
N
National security
24,536
Murder/manslaughter
9222
Public disorder
1906
Assault
578
Property
546
Recidivism
rate
17.1%
18.4%
25.1%
25.8%
27.6%
The decline in recidivism by length of sentence served is evident also in the relatively short sentences of up to 2 years (Fig. 5, left panel).
Offence Type
As noted above, offence type, and the type of offences contained in offender histories, are known predictors of recidivism. Accordingly, offence types affected the
risk of recidivism in our sample (Table 1). Following findings from criminology, the
recidivism rate for offenders who committed violent (assault offense) and disorderly offences--(25.7%--was found to be significantly higher than the rate found for
offences tagged as “national security”, which include offences such as p­ ossession/
manufacture of weapons, possession of weapons, affiliation with proscribed organizations, or contact with foreign agents, were correlated with significantly lower
recidivism (Χ2(1) = 134.29, p < 0.0001).
Terrorist Recidivism in Israel: Rates, Patterns and Risk Factors
Table 2 Number of
individuals affiliated to each
Palestinian organization,
and their respective
recidivism rate
Table 3 Prevalence by
marital status and respective
recidivism rates
97
Affiliation
N
Unaffiliated
3733
Fatah
14,105
Hamas/Islamic Jihad
8813
Secular factions
1701
Status
Single
Married
Divorced or widowed
Unknown
Prevalence
78.0%
17.9%
<0.1%
4.1%
Recidivism
rate
8.2%
18.3%
18.6%
22.1%
Recidivism
18.8%
15.4%
12.3%
3.2%
Affiliation
Most individuals in our samples were affiliated with one of the major Palestinian
organizations. About half (49.7%) was affiliated with Fatah and a third (31.1%) with
Hamas and Islamic Jihad (31.1%). 6.0% were affiliated with one of the secular
organizations (e.g. Popular Front for the Liberation of Palestine), and a negligible
number (<0.1%) were affiliated with “other” groups. 13.2% of the prisoners were
unaffiliated. Whilst recidivism rates for affiliates of the different organizations were
nearly identical (see Table 2), they were significantly greater than unaffiliated
(Χ2(1) = 247.7, p < 0.0001).
Marital Status
The majority of the sample were registers as being single, whereas 17.9% were married, <0.1% divorced or widowed, and 4.1% were listed with an unknown marital
status. Overall, the recidivism rate for offenders listed as single was significantly
greater that for all other marital statuses (Χ2(1) = 31.87, p < 0.0001), while the prisoners that did not report marital status only seldom recidivated (Table 3).
Discussion
A growing literature that approaches terrorism from a criminological perspective
has now identified that significant overlaps exist between criminals and terrorism
offenders, as well as patterns in criminal and terrorism related phenomena. In this
chapter we set out to identify to what extent such overlaps may extend to recidivism,
namely with respect to the rates of recidivism and recidivism-related risk factors.
98
T. Carmel et al.
Our study in the Israeli context represents an important case study that could have
implications for other settings. A study of recidivism in Israel based on data from
2008 found that the 5 year recidivism rate for security offenders was 7.9%, and
41.3% for ordinary crime (Walk and Berman 2015). On the other hand, our prior
research on a sub-sample of terrorism offenders from Jerusalem we found that the
five-year terrorist recidivism rate was 60.2% (Hasisi et al. 2019). These differences
can be explained by the fact that the population of security prisoners in Israel is
predominantly not from Jerusalem but from the West Bank (about 95%), hence our
results are not contradictory. Our findings of a recidivism rate of 20%, being near
exactly half of the recidivism rate for ordinary crime in Israel, demonstrate an
important overlap with the relative rates for recidivism to the same offence noted
above. They also demonstrate that recidivism rates deduced from limited observational periods may underestimate the phenomenon (Walk and Berman 2015).
In this regard, our study highlights the importance of looking at recidivism over
a longer period of time. Had we limited our analysis to 5 years, for those with 2 or
more prior incarcerations, we would have missed out on 5% of the recidivists in the
dataset. Following general trends observed in criminal recidivism, we found that the
rate of recidivism increased following each additional incarceration for a terrorism
offence. Since each additional incarceration involves a period in which the offenders is incapacitated and unable to re-offend, the importance of the longer observation period is even more striking. In fact, the small differences in recidivism between
5 and 10 years, relative to sentences less than 5 years, indicate the existence of an
incapacitation effect in determining recidivism rates.
These findings are inherently dependent on the effects of incarceration length. As
discussed in the literature review, the evidence is quite mixed as to whether longer
incarcerations have a greater deterrent or criminogenic effect when it comes to recidivism. In the context of terrorism, much of the focus has been on the role of longer
incarcerations. However, as demonstrated by our data, the majority of terrorism-­
related offences may be for non-violent offences, or at least offences that did not lead
to the actual commission of a successful terror attack. As such, like in Europe and the
US, incarcerations for terrorism-related offences can actually be quite short.
In this study, a clear decline in recidivism was associated with longer sentences
up to 7 years long. However, the trends seem to be less conclusive in sentences longer than 7 years. As has been noted in the literature, it can be quite difficult to disentangle the degree to which incapacitation and deterrence contribute to declining
recidivism rates associated with longer incarceration periods. One of the issues with
shorter sentences is that offenders are still young when they are released, and
thereby still within the peak ‘risk’ period for offending. On the other hand, longer
sentences are often associated with older age at the time of release, meaning that the
incapacitation period has given the offenders an opportunity to ‘age out’ of offending. Given the mean age of our sample fell within the peak risk period, relatively
short sentences of a few years might be enough to incapacitate high-risk prisoners
in a critical period in their life (see Figs. 2 and 3 for support of this assumption).
Possible deterrent effects can potentially be deduced by the declining rates of
recidivism associated with offenders serving even exceptionally short incarceration
Terrorist Recidivism in Israel: Rates, Patterns and Risk Factors
99
periods. In this range of incarceration lengths, the age of offenders does not change
dramatically, thus it is unlikely that mere incapacitation is the cause of the declining
trend. While it is clear that both incapacitation and deterrence play a role, our data
does not permit for extrapolating to what degree these two causes may be responsible for the observed trends.
With regards to offence type, can be said to be consistent with the evidence from
research on criminal recidivism. Generally speaking, violent offenders have higher
rates of recidivism than non-violent offenders. However, this may exclude both violent and non-violent offenders of rare crimes, for which recidivism rates are also
lower (Blokland and Nieuwbeerta 2004). Our results show that more severe
offences, such as manslaughter and murder, were associated with relatively low
recidivism rates. This is understandable given that such offences are generally associated with longer incarceration periods. As discussed, longer sentences reduce the
amount of time during the observation period in which the offender has an opportunity to recidivate, and also means that offenders are older at the time of their release,
which in and of itself is associated with lower recidivism as well.
Perhaps most importantly however is our findings that offenses classified as
“national security” were associated with the lowest recidivism rates. This offense
category includes a wide range of offenses, from being an active member of an
illegal organization to producing weapons, and coordinating attacks. It can be said
that offences in this category are generally less descriptive of direct confrontational
and violent behavior. It is possible that prisoners who were more active in participating in violent acts will be more prone to being involved again after their release
than those who were less active in the first place. Nevertheless, given how general
this offence category is, it is difficult to try to extrapolate the underlying explanations for the low recidivism rates.
As our data highlights, the majority of offenders were affiliated with a recognized terrorist organization. Unaffiliated prisoners were significantly less likely to
recidivate than affiliated prisoners. Among affiliated offenders, there were little differences in the recidivism rates, regardless of which organization they were affiliated with; although these organizations differ in considerably in terms of their
identity and doctrine (e.g. religious, secular). It can generally be said that these
organizations enjoy relatively high popular support. It is possible that the similarities in recidivism rates associated with affiliated offenders reflects such support.
The role of such support may also be considered with respect to marital status,
for which our findings are similar to what has generally been found in the literature
on ordinary criminal recidivism. Namely, that married individuals are less likely to
recidivate than non-married. However, these results stand in contrast to previous
findings that marriage can be a risk factor for terrorist recidivism (Altier et al. 2019;
Hasisi et al. 2019). Additionally, it is interesting to note that among the small sample
of offenders for whom a marital status identification is lacking, the rate of recidivism was found to be exceptionally low (3.2%). Since the reason for the missing
information is difficult to assess, it is difficult to explain why they had such a low
rate of recidivism. Further investigation of the characteristics of prisoners with
missing marital status is needed to resolve this puzzling outcome. Given the dis-
100
T. Carmel et al.
crepancies, further research is needed in order to disentangle the risk-protective
effects of marriage on recidivism to terrorism. Whilst every country’s experience
with terrorism is unique, Israel has often served as an important case study of terrorism and counter-terrorism that may be applicable to other Western contexts.
Lastly we identified important differences between recidivism rates of offenders
from Jerusalem and the West Bank. Similar to the effects of organizational affiliation and marriage, these findings can possibly be explained by differences in the
structures of support, but also of opportunities that exist between these two places
(Bélanger 2017; Speckhard et al. 2017). Firstly, Jerusalem residents reside in areas
under full Israeli administration. Their incarceration histories mean that their
employment opportunities may be more restricted. Additionally, they may be subject to more ongoing interaction with the Israeli state and with security services in
particular. On the other hand, West Bank residents may be able to live their lives in
the Palestinian Authority governed territories quite separate from the Israeli state
and its security apparatus. Here, the general society would view them as having
‘served their time’ for a national goal. Released terrorism offenders be offered better employment opportunities, with many jobs, especially government jobs under
the auspices of the Palestinian Authority, giving preference to, and in some cases
being reserved for those who have spent time in Israeli prisons for security-related
offences.2 Unlike ordinary criminals, terrorism offenders are viewed as legitimate,
and rather than being labeled as deviant, their activities may lead them to gain
higher social status. As such, the opportunities in the West Bank, which has a­ rguably
witnessed much improvement compared to East Jerusalem, may be more conducive
to desistance.3
As a large literature emphasizes, whilst every country’s experience with terrorism is unique—and the Israel and Palestinian one is no different in this regard—
important lessons can be drawn from seemingly different contexts. In this regard,
Israel has often served as an important case study for lessons on terrorism and
counter-­terrorism that may be applicable to other Western contexts. As described in
the literature review, there is significant overlap in the existing evidence pertaining
to trends in terrorism-related phenomena. A growing literature that approaches terrorism from a criminological perspective has now identified that significant overlaps exist between criminals and terrorism offenders, as well as patterns in criminal
and terrorism related phenomena. In this study we have identified that these overlaps also extend to the observed patterns of recidivism and the different factors that
affect these patterns.
While the Palestinian Authority sometimes denies such claims, the Arabic website for the
Commission of Detainees and ex-Detainees Affairs includes links to laws and regulations concerning payments to detainees and former detainees, as well as exclusive job advertisements which
include being a former detainee as a pre-requisite for application. See http://cda.gov.ps/
3
Polls conducted by the Palestinian Center for Policy and Survey Research (PCPSR) consistently
show that support for violence and armed struggle is consistently greater in “villages/towns/cities”
as well as “refugee camps” than it is in “the West Bank”. The results of the polls can be found at
http://pcpsr.org/en/node/154.
2
Terrorist Recidivism in Israel: Rates, Patterns and Risk Factors
101
Conclusions
The study of terrorist recidivism has to date not received the type of attention that it
deserves and demands. In the coming years, hundreds of terrorism offenders are set
to be released in Western countries, especially in Europe and the U.S. While many
commentators and analysts have expressed fears over the potential for these offenders to re-offend, little is known about what the actual likelihood of recidivism is. To
date, most studies have focused primarily on qualitative assessments of programs
that seek to promote de-radicalization and disengagement, by which one measure is
recidivism. However, with a lack of data on what base-line rates of terrorist recidivism may look like, and what factors may affect terrorist recidivism, it is difficult
for programs to be evaluated based on recidivism measures. Additionally, not all
terrorism offenders are participating in such programs.
The study presented in this chapter suggests that like many other terrorism-­
related phenomenon, terrorist recidivism is likely to follow patterns that closely
resemble those found with respect to ordinary crime. Like other forms of recidivism
to the same offence type for rare offences, terrorist recidivism can be expected to
reach approximately half of the general recidivism rate. Similarly, risk factors such
as age at time of incarceration and release, number of prior incarcerations, and
length of incarceration, are likely to impact the likelihood of recidivism to terrorism
in a similar fashion as they do for ordinary criminal recidivism.
While the study presented in this chapter provides additional evidence to support
the continued application of criminological perspectives to the study of terrorism,
and highlights additional areas of overlap between criminal and terrorism offenders,
it also highlights that key differences also exist. Given these findings, it is imperative that researchers further investigate the role of factors known to affect recidivism
with respect to terrorist recidivism, in order to better develop risk assessment
approaches, and evaluations of programs that aim to prevent the re-offending of
extremist offenders following their release from prison.
References
Altier M. B., Horgan, J., Thoroughgood, C. (2012). Returning to the fight: what the literature on
criminal recidivism can contribute to our understanding of terrorist recidivism. Department of
Homeland Security report
Altier, M. B., Thoroughgood, C. N., & Horgan, J. G. (2014). Turning away from terrorism: Lessons
from psychology, sociology, and criminology. Journal of Peace Research, 51(5), 647–661.
Altier, M. B., Leonard Boyle, E., & Horgan, J. G. (2019). Returning to the fight: an empirical
analysis of terrorist reengagement and recidivism. Terrorism and Political Violence, 1–25.
Bovenkerk, F. (2011). On leaving criminal organizations. Crime, Law and Social Change, 55(4),
261–276.
Blokland, A. A. J., & Nieuwbeerta, P. (2004). Recidive en het beëindigen van de criminele carrière
over een periode van 25 jaar. Tijdschrift voor Criminologie, 46(1), 18–36.
Ben-Zvi, K., & Walk, D. (2011). Recidivism shel asirim plilim m’shuchrarey 2004 b’Yisrael
[Recidivism of criminal prisoners released in 2004 in Israel]. Tzohar l’Beit ha’Sohar [Window
into the Prison], 14, 10–28.
102
T. Carmel et al.
Berrebi, C. (2007) Evidence about the Link Between Education, Poverty and Terrorism among
Palestinians. Peace Economics, Peace Science and Public Policy 13(1).
Bakker, E. (2006). Jihadi terrorists in Europe. The Hague: Cliengendael.
Bjørgo, T. (2008). Processes of disengagement from violent groups of the extreme right. In Leaving
terrorism behind (pp. 48–66). Routledge.
Bélanger, J. J. (2017). The rise and fall of violent extremism: The science behind community-­
based interventions. In The Motivation-Cognition Interface (pp. 170–195). Routledge.
Clifford, B. (2018). Radicalization in Custody. Towards Data-Driven Terrorism Prevention in the
United States Federal Correctional System, Program on Extremism Policy Paper, The George
Washington University.
Cragin, R. K. (2017). The challenge of foreign fighter returnees. Journal of contemporary criminal
justice, 33(3), 292–312.
Chermak, S., & Gruenewald, J. A. (2015). Laying a foundation for the criminological examination
of right-wing, left-wing, and Al Qaeda-inspired extremism in the United States. Terrorism and
Political Violence, 27(1), 133–159.
Chesney, R. M. (2007). Federal prosecution of terrorism-related offenses: conviction and sentencing data in light of the soft-sentence and data-reliability critiques. Lewis & Clark L. Rev.,
11, 851.
Dernevik, M., Beck, A., Grann, M., Hogue, T., & McGuire, J. (2009). The use of psychiatric
and psychological evidence in the assessment of terrorist offenders. The Journal of Forensic
Psychiatry & Psychology, 20(4), 508–515.
Dooley, B. D., Seals, A., & Skarbek, D. (2014). The effect of prison gang membership on recidivism. Journal of Criminal Justice, 42(3), 267–275.
De Kerchove, G., & Höhn, C. (2016). “The Regional Answers and Governance Structure
for Dealing with the Foreign Fighters: The Case of the EU”, In De Guttry, A.; Capone, F.;
Paulussen, C. (Eds.), Foreign Fighters under International Law and Beyond, T.M.C. Asser
Press/Springer Verlag: The Hague, 299–332.
Fahey, S. (2013). Predictors of Release from Guantánamo Bay and Detainee Recidivism.
International Journal of Criminology and Sociology, 2, 453–468.
Ganor, B., & Falk, O. (2013). De-radicalization in Israel’s prison system. Studies in conflict &
terrorism, 36(2), 116–131.
Gill, P., Horgan, J., & Deckert, P. (2014). Bombing alone: Tracing the motivations and antecedent
behaviors of lone‐actor terrorists. Journal of Forensic Sciences, 59(2), 425–435.
Gill, P., Horgan, J., Corner, E., & Silver, J. (2016). Indicators of lone actor violent events: The
problems of low base rates and long observational periods. Journal of Threat Assessment and
Management, 3(3–4), 165.
Harms, J. (2017). The war on terror and accomplices: An exploratory study of individuals who
provide material support to terrorists. Security Journal, 30(2), 417–436.
Hodwitz, O. (2019). The Terrorism Recidivism Study (TRS). Perspectives on Terrorism,
13(2), 54–64.
Hasisi, B., Carmel, T., Weisburd, D., & Wolfowicz, M. (2019). Crime and terror: examining criminal risk factors for terrorist recidivism. Journal of Quantitative Criminology, 1–24.
Horgan, J., & Braddock, K. (2010). Rehabilitating the terrorists?: Challenges in assessing the
effectiveness of de-radicalization programs. Terrorism and Political Violence, 22(2), 267–291.
Høigilt, J. (2016). Fatah from below: The clash of generations in palestine. British Journal of
Middle Eastern Studies 43(4), 456–471.
Hegghammer, T. (2013). Should I Stay or Should I Go? Explaining Variation in Western
Jihadists' Choice between Domestic and Foreign Fighting. American Political Science Review
107(1), 1–15
Klausen, J., Morrill, T., & Libretti, R. (2016). The terrorist age‐crime curve: An analysis of
American Islamist terrorist offenders and age‐specific propensity for participation in violent
and nonviolent incidents. Social Science Quarterly, 97(1), 19–32.
Terrorist Recidivism in Israel: Rates, Patterns and Risk Factors
103
Kebbell, M. R., & Porter, L. (2012). An intelligence assessment framework for identifying individuals at risk of committing acts of violent extremism against the West. Security Journal,
25(3), 212–228.
Kaplan, E. L., & Meier, P. (1958). Nonparametric estimation from incomplete observations.
Journal of the American statistical association, 53(282), 457–481.
Klausen, J., Libretti, R., Hung, B. W., & Jayasumana, A. P. (2018). Radicalization trajectories:
An evidence-based Computational approach to dynamic risk assessment of “Homegrown”
Jihadists. Studies in Conflict & Terrorism, 1–28.
Liem, M. (2013). Homicide offender recidivism: A review of the literature. Aggression and Violent
Behavior 18(1), 19–25.
Miethe, T. D., Olson, J., & Mitchell, O. (2006). Specialization and persistence in the arrest histories of sex offenders: A comparative analysis of alternative measures and offense types. Journal
of Research in Crime and Delinquency, 43(3), 204–229.
Mears, D. P., Cochran, J. C., & Cullen, F. T. (2015). Incarceration heterogeneity and its implications for assessing the effectiveness of imprisonment on recidivism. Criminal Justice Policy
Review, 26(7), 691–712.
Mitchell, O., Cochran, J. C., Mears, D. P., & Bales, W. D. (2017). Examining prison effects on
recidivism: A regression discontinuity approach. Justice Quarterly, 34(4), 571–596.
Mullins, S. (2010). Rehabilitation of Islamist terrorists: Lessons from criminology. Dynamics of
Asymmetric Conflict 3(3), 162–193.
Masters, D. (2004). Support and Nonsupport for Nationalist Rebellion: A Prospect Theory
Approach. Political Psychology 25(5), 703–726.
Meade, B., Steiner, B., Makarios, M., & Travis, L. (2013). Estimating a dose–response relationship
between time served in prison and recidivism. Journal of Research in Crime and Delinquency,
50(4), 525–550.
Norris, J. J. (2019). Explaining the Emergence of Entrapment in Post-9/11 Terrorism Investigations.
Critical Criminology 27(3), 467–483.
Owens, E. G. (2009). More Time, Less Crime? Estimating the Incapacitative Effect of Sentence
Enhancements. The Journal of Law and Economics 52(3), 551–579.
Pluchinsky, D. A. (2008). Global jihadist recidivism: A red flag. Studies in Conflict & Terrorism,
31(3), 182–200.
Prentky, R. A., Lee, A. F., Knight, R. A., & Cerce, D. (1997). Recidivism rates among child
molesters and rapists: A methodological analysis. Law and Human Behavior, 21(6), 635–659.
Pyrooz, D. C., LaFree, G., Decker, S. H., & James, P. A. (2018). Cut from the same cloth? A
comparative study of domestic extremists and Gang Members in the United States. Justice
Quarterly, 35(1), 1–32.
Pettinger, T. (2017). De-radicalization and Counter-radicalization: Valuable Tools Combating
Violent Extremism, or Harmful Methods of Subjugation?. Journal for Deradicalization,
(12), 1–59.
Perliger, A., Koehler-Derrick, G., & Pedahzur, A. (2016). The gap between participation and violence: Why we need to disaggregate terrorist ‘profiles’. International Studies Quarterly, 60(2),
220–229.
Porges, M. L.(2010). Deradicalisation, the Yemeni Way. Survival 52(2), 27–33.
Piquero, A. R., Jennings, W. G., & Barnes, J. C. (2012). Violence in criminal careers: A review of
the literature from a developmental life-course perspective. Aggression and Violent Behavior,
17(3), 171–179.
Rydberg, J., & Clark, K. (2016). Variation in the incarceration length-recidivism dose–response
relationship. Journal of Criminal Justice, 46, 118–128.
Silke, A., & Veldhuis, T. (2017). Countering violent extremism in prisons: A review of key recent
research and critical research gaps. Perspectives on Terrorism, 11(5), 2–11.
Speckhard, A., Shajkovci, A., & Yayla, A. (2017). Following a military defeat of ISIS in Syria
and Iraq: what happens next after the military victory and the return of foreign fighters?.
Contemporary Voices: St Andrews. Journal of International Relations, 8(1), 81–89.
104
T. Carmel et al.
Sageman, M. (2004). Understanding terror networks. University of Pennsylvania Press,
Philadelphia.
Spivak, A. L., & Damphousse, K. R. (2006). Who returns to prison? A survival analysis of recidivism among adult offenders released in Oklahoma, 1985–2004. Justice Research and Policy,
8(2), 57–88.
Silke, A. (2008). Research on terrorism. In Chen H., Reid E., Sinai J., Silke A., Ganor B. (eds)
Terrorism Informatics. Integrated Series In Information Systems, vol 18. Springer, Boston,
MA (pp. 27–50).
Silke, A. (2014). Risk assessment of terrorist and extremist prisoners. In A. Silke (Eds.) Prisons,
terrorism and extremism: Critical issues in management, radicalisation and reform, 108–121.
Routledge. New York.
Stys, Y., & Ruddell, R. (2013). Organized crime offenders in Canada: Risk, reform, and recidivism. Journal of Offender Rehabilitation, 52(2), 75–97.
Samuel, E. B. (1998). Israel's Demoralization. Middle East Quarterly 5(3), 3–12.
van der Heide, L., & Schuurman, B. (2018). Reintegrating Terrorists in the Netherlands: Evaluating
the Dutch approach. Journal for Deradicalization, 17, 196–239.
Waldo, G., & Griswold, D. (1979). Issues in the measurement of recidivism. Sechrest, L., White,
S.O. and Brown, E.D. (Eds.), The rehabilitation of criminal offenders: Problems and prospects,
225–250. Washington, DC: The National Academies Press
Wiesner, M., Yoerger, K., & Capaldi, D. M. (2018). Patterns and correlates of offender versatility and specialization across a 23-year span for at-risk young men. Victims & Offenders,
13(1), 28–47.
Walk, D., Berman, E. (2015). The Recidivism of Israeli Prisoners. Israel Prison Service, Ramla
Weilnböck, H. (2012). Hate Crime and Radicalisation: the German Political Experience and the
Schellenberg Report. Belfast: NIACRO.
Unintended Negative Outcomes
of Counter-Terrorism Policing: Procedural
(in)Justice and Perceived Risk
of Recruitment into Terrorism
Justice Tankebe
Introduction
Although terrorism has always attracted academic interests, these interests have
grown exponentially since the New York terrorist attacks of September 2001.
Several cities have since suffered similar attacks, including London (UK), Bagdad
(Iraq), Madrid (Spain), Bali (Indonesia), Mumbai (India), and Konduga (Nigeria)
(see http://apps.start.umd.edu/gtd/). The rise and demise of the Islamic State of Iraq
and Syria (ISIS) further increased the global research and policy interest in the
topic. Among the key research questions is the risk of radicalisation, or recruitment
into terrorism (Borum 2011; Dalgaard-Nielsen 2010). Radicalisation refers to “a
process of escalation from nonviolent to increasingly violent repertoires of action
that develops through a complex set of interactions unfolding over time” (della
Porta 2018: 461). The research evidence points to the role of various structural and
individual factors, including criminal history, lack of employment opportunities and
mental health (LaFree et al. 2018; McCauley and Moskalenko 2008).
However, a major cautionary tale in counter-terrorism practices is the risk of
unintended negative effects; that is, of these practices increasing rather than reducing the risk of terrorism. Thus, 2 years after the terrorist attacks in New York on
September 2001, Mr Kofi Annan, the late Secretary General of the United Nations,
remarked at a conference that counter-terrorism practices risked “acting as a recruiting sergeant for the very terrorists we seek to suppress” (Annan 2003). Unintended
negative outcomes of counter-terrorism may also find expression in public disinclination to cooperate with security agencies, such as refusing voluntarily to supply
them with information about terrorist activities in their local communities. The concern with unintended negative outcomes arises from the perspective that terrorism
is not merely a dyadic interaction between states and violent non-state actors; on the
J. Tankebe (*)
Institute of Criminology, University of Cambridge, Cambridge, UK
e-mail: jt340@cam.ac.uk
© Springer Nature Switzerland AG 2020
D. Weisburd et al. (eds.), Understanding Recruitment to Organized Crime
and Terrorism, https://doi.org/10.1007/978-3-030-36639-1_5
105
106
J. Tankebe
contrary, terrorist campaigns involve a triad of “strategic actors – the group, the
government, and the audience” Cronin (2009). A feature of the dynamic relationship between the State and terrorist groups, argues Cronin, is a struggle to claim
legitimacy among local communities. On this perspective, terrorists sometimes
tempt the State into actions that delegitimate it both in the eyes of domestic and
international audiences (Cronin 2009).
Understanding how people experience and perceive counter policing and its
impact can, therefore, be vital not only in encouraging public collaboration, but in
preventing radicalisation (see Murphy et al. 2017; Mumpower et al. 2013). Counter-­
terrorism practices take different forms and at different levels, and involve a multiplicity of actors. One of these actors are the police, and Mr. Annan’s caution draws
attention to the nature of the police’s counter-terrorism practices. In the United
Kingdom, counter-terrorism strategies are believed to have led to the singling out of
sections of populations for “state attention as being ‘problematic’ […and] may be
targeted, not necessarily as a result of suspected wrong doing, but simply because of
their presumed membership to that sub-group” (Pantazis and Pemberton 2009:
647). Counter-terrorism strategy in the United Kingdom – especially the element of
prevent, which aims to “stop people becoming terrorists or supporting terrorism”
(Home Office 2018: 8) – has been more controversial because of concerns that it
disproportionately targets Muslim communities. Consequently, scholars have raised
concerns that the strategy has made Muslims a “suspect community”, with the
attendant fear that the nature of their everyday interactions with police raises questions about unintended, even counter-productive, consequences (e.g. Choudhury
and Fenwick 2011).
These concerns resonate with the arguments of police legitimacy theory
according to which “the public evaluates police, courts, and the law primarily in
terms of how authority is exercised. Police build perceived legitimacy among
the public by treating people fairly during personal encounters” (Tyler et al.
2010: 370). Research evidence from nonterror shows that perceived fairness of
police practices changes people’s orientations towards the law, including
increased likelihood of offending. However, with a few exceptions (for example, Murphy, Cherney and Teston 2019; Tyler et al. 2010), this literature has not
been extended to terrorism. Moreover, studies such as Tyler et al. (2010) rely on
correlational designs. Thus, the results reported in this chapter extends current
literature in two important ways: first, we apply legitimacy theory to test the
claims about unintended outcomes of counter-terrorism practices. Specifically,
and drawing upon data from an experimental factorial design, we test whether
the fairness of counter-terrorism practices increases the perceived risk of recruitment into terrorism. Second, and consequent to this contribution, we add to a
small body of legitimacy studies that apply experimental designs to test the
effects of procedural justice on people’s orientations to legal authorities (for
example, Mazerolle et al. 2013; MacQueen and Bradford 2015), thereby
responding to recurrent arguments for experimental studies of legitimacy (see,
Nagin and Telep 2017; Hyde 1983).
Unintended Negative Outcomes of Counter-Terrorism Policing: Procedural (in)Justice…
107
Procedural (in)Justice Theory and Terrorism Recruitment
Legitimacy has emerged as a central concept in criminological analyse of lawbreaking and cooperation with criminal justice agencies. It is founded on a view of human
actors as “norm-users, whose interactions with each other depend on mutually recognizable patterns that can be articulated in terms of right versus wrong conduct, or
of what one ought to do in a certain setting” (MacCormick 2007: 20). It follows that
attempts to understand people’s orientations to legal authorities demand some consideration of the legitimacy status of those authorities (Beetham 1991). The powers
of legal authorities are legitimate if they are “acknowledged as rightful by relevant
agents, who include power-holders and their staff, those subject to the power and
third parties whose support or recognition may help confirm it” (Beetham 2013:
19). A defining feature of legitimacy is that it is normative and dynamic, requiring
constant negotiation and renegotiation between relevant agents in a power relationship (Bottoms and Tankebe 2012, 2017). As Dunn (2013: 1) put it, legitimacy is “a
process of permanently active judgment (by multiple audiences), conducted with
very uneven alertness and imaginative engagement”.
There are many perspectives on legitimacy in criminology. One view measures
legitimacy in terms of citizens’ sense of obligation to obey legal authorities, institutional trust, and judgment that the values of power-holders align with those of citizens (Sunshine and Tyler 2003; Jackson et al. 2012). This is incurably deficient to
the extent that it fails to see clearly the difference between legitimacy, and trust and
obligation.1 The alternative view, as exemplified in the work of Bottoms and Tankebe
(2012, 2017), consider the multi-dimensionality of legitimacy as comprising judgments about effective exercise of authority, the actual or perceived lawfulness of
power, and fairness in distribution of resources (distributive justice) and in processes used to reach specific decisions (procedural justice) (for empirical analyses
using this latter approach, see Kearns, Ashooh and Lowrey-Kinberg 2019; Tankebe
2013; Tankebe et al. 2016). This study is situated in the Bottoms-Tankebe model,
focusing specifically on the procedural justice dimension of legitimacy.
Although dating back to Thibaut and Walker (1975), it is to Tyler that we owe the
stature of procedural justice in criminology today. A series of papers on procedure
justice culminated in Why People Obey the Law, in which Tyler (1990) outlined a
theory of procedural justice – its meaning and dimensions. Procedural Justice
describes “the fairness of the processes through which the police make decisions
and exercise authority” (Sunshine and Tyler 2003: 514). It has two interrelated
dimensions: quality of decision-making and quality of interpersonal treatment
(Sunshine and Tyler 2003). The former has three key elements: voice/participation;
neutrality; trustworthy motives. An explanation-voice dimension captures both a
normative desire for decisionmakers to given reasons for their decisions and the
This is not the place for a discussion of conceptual differences. Yet, the point must be made that
conceptual clarity is crucial to theory development and fruitful research. It is a mistake to attempt
to settle conceptual challenges by recourse to complex statistical analyses (see Blumer 1954).
1
108
J. Tankebe
extent to which they offer opportunities for civilian inputs in decision-making by
listening (attentively) to what they have to say (Tyler 1990, 2006: 116). Neutrality
hinges on people’s desire for “unbiased decision makers”, making decisions based
on pertinent objective information (Tyler 2006: 137). Thus, for example, is decision-making informed by the relevant facts or it is based on personal biases and
prejudice? The notion of trustworthy motives refers to “inferences about the intentions behind actions, intentions that flow from a person’s unobservable motivations
and character” (Tyler and Huo 2002: 61). Quality of interpersonal treatment, on the
other hand, encapsulates judgments that an individual has been treated with appropriate dignity and recognition as a person, including (where relevant) recognition of
the person’s particular needs and characteristics. Bottoms and Tankebe (2012: 145)
describe this component as the “more personal” of the elements, focused on
“whether the decision-maker treats the subject in a true sense as a human being,
with needs for dignity, privacy, respect for his or her moments of weakness,
and so on”.
Procedural justice appears empirically important because it conveys symbolic
cues about a person’s membership in society. As Tyler put it:
Although politeness and concerns for one’s rights seem like minor aspects of an interaction
with a legal authority, they convey considerable information about status within the group.
When the police harass members of minority groups, the poor, or the young, they are communicating to those groups that they have marginal social status (Tyler 2006: 176).
A number of correlational studies have shown that perceived procedural justice nurtures law-abiding behaviour and positive legal orientation (for example, Slocum and
Wiley 2018; Tankebe et al. 2016). Using data from England and Wales, Jackson and
his colleagues found evidence of positive association between procedural justice
judgements and predispositions to comply with the law (Jackson et al. 2012).
However, Augustyn (2015) reported that, among a sample of adolescent offenders,
procedural justice increased frequency of offending adolescent onset offenders.2
Similarly, Tankebe et al. (2019) reported that, on its own, procedural justice did not
correlate with commercial vehicle drivers’ self-reported violations of traffic rules;
however, an interaction effect between procedural justice and corruption experiences increased the likelihood of traffic violations.
A much smaller body of research have applied experimental designs to test the
effects of fairness treatment on orientations to legal authorities. In Queensland
(Australia), Mazerolle and her colleagues tested the effects of procedural justice
treatment on various attitudes of drivers stopped for breath tests (Mazerolle et al.
2013). They found that drivers who experienced procedurally just traffic stops were
more likely than those in a control group to express intentions to comply with traffic
laws. Drawing on data from factorial design study in the United States, Reisig et al.
(2018) tested the effects of procedural injustice by police officers in the contexts of
Augustyn argued that fair and respectful experiences might have led the adolescents to form the
view that interactions with courts and the police were not ‘that bad’ and, therefore, future interactions are not to feared.
2
Unintended Negative Outcomes of Counter-Terrorism Policing: Procedural (in)Justice…
109
traffic stops and noise complaints among a sample of undergraduate students in the
United States. They found that exposure to procedural injustice undermined the
propensity to accept police decisions and to comply with directives by officers.
Similarly, Lowrey et al. (2016) tested the effects of fair treatment by showing videos
of procedurally just and procedurally unjust traffic encounters to a sample of undergraduate students at universities in the United States. Consistent with other studies,
trust in the police was greater among those who viewed procedurally just videos
than those viewing procedurally unjust videos.
In specific area of terrorism policing, the studies have been correlational in
design. Murray, Mueller-Johnson and Sherman (2015) found that areas with high
concentrations of violent extremism were also hotspots of low confidence in the
police. Analysing data from a telephone survey of Muslim Americans in New York
City, Tyler et al. (2010) found that perceptions that police anti-terror practices were
procedural just increased people’s willingness to cooperate with the police to fight
terrorism. In Australia, Murphy, Cherney and Teston (2019) analysed data from 800
Muslims on their support for counter-terrorism policing. They found that procedural
justice perceptions increase people’s willingness to report terrorism activities to the
police. Further, feelings of social inclusion were found to predict intentions to report
terrorism. Jonathan-Zamir et al. (2016) administered a questionnaire to a sample of
1970 Arab Israeli, Jewish Israeli and foreign passengers at an airport in Israel to test
the influence of procedural justice on reactions to enhanced security screening tactics. They found that experiencing the screening as being procedurally just decreased
the feeling of humiliation, intimidation and insensitivity. Finally, Doosje et al.
(2013) surveyed 131 Dutch Muslim youths to investigate their views on violent
extremism by fellow Muslims and their own violent intentions. They found that
perceived procedural injustice weakened the bonds between the youths and Dutch
society, which, in turn, increased their acceptance of violence by fellow Muslims.
In summary, the procedural justice component of legitimate power places emphasis on the perceived morality of processes in the use of authority. The key moral
ingredients are participatory decision-making, respectful and dignified treatment, neutrality, and the trustworthy motives of power-holders. These moral judgements have been shown to induce a feeling of obligation to obey rules and
institutions, which, in turn, leads to actual and intended behaviours across different
settings. However, while the research evidence predominantly supports the theoretical arguments, the literature is not without limitations. Two of these are pertinent here.
The first concerns evidence of contextual influences such that procedural justice
offers “no simple recipe for winning legitimacy” (Waddington et al. 2015: 212; see
also, Worden and McLean 2017). Waddington and his colleagues found, through
analyses of public evaluations of videos of police behaviour, that a history of difficult police-public relations can mean people enter interactions with priors that
sometimes neutralise the effects of procedural justice. Tyler (2000) also showed
that, when people have strong bonds with subgroups, procedural justice tended to be
a secondary normative expectation when they interacted with power-holders.
Second, there are concerns about the evidence base for procedural justice theory,
110
J. Tankebe
especially as this relates to crime prevention. Thus, in their review of the evidence,
Weisburd and Majmundar (2018: 8) conclude that:
There is currently only a very small evidence base from which to support conclusions
about the impact of procedural justice policing on crime prevention. Existing research
does not support a conclusion that procedural justice policing impacts crime or disorder
outcomes. At the same time, because the evidence base is small, the [Committee on
Proactive Policing] also cannot conclude that such strategies are ineffective (see also
Nagin and Telep 2017).
Consequently, the evidence requires us to adopt an agnostic position on the effects
of procedural justice on criminal involvement. The two limitations are not mutually
exclusive: contextual and relational variations add to the challenges of building
more robust evidence base for procedural justice. Additionally, the predominance of
correlational studies over those using experimental designs makes it difficult to
establish causal links. In using a factorial experimental design to test procedural
justice effects among a national sample of Muslims, the current study represents a
major step in addressing some of the limitations in the literature.
Terrorism and Counter-Terrorism in the United Kingdom
Terrorism, in its various forms, have a long history in the United Kingdom. However,
the most recent history dates to the London underground bombings of July 2005
which killed 52 people. These were followed by other attempted and successful
attacks. For example, in May 2017, a young man detonated homemade bomb as
young people made their way out of musical concert in Manchester, killing 22 of
them. It was one of five attacks in 2017, including those at Westminster Bridge and
the Houses of Parliament in London, resulting in 36 deaths. According to official
statistics, there were 2029 terrorism arrests between 2010 and 2017 in Great Britain,
and a further 500 ongoing investigations, involving 3000 individuals (Home
Office 2018).
The counter-terrorism strategy for the United Kingdom, known as CONTEST,
has four strands: prevent (“stop people from becoming terrorists or supporting
terrorism”); pursue (stop terrorist); protect (“strengthen … protection against a
terrorist attack”) and prepare (“mitigate the impact of a terrorist attack”) (Home
2018: 8). These strands translate into various everyday policing tactics such as
stop and searches for the purposes of terrorism prevention. The most notable
counter-­terrorism legislations include Terrorism Act 2000, Terrorism Act 2006,
and Counter-­terrorism and Security Act 2015. Section 43 of Terrorism Act 2000
grants police constables the power to stop and search a person whom they “reasonably suspects to be a terrorist to discover whether he has in his possession
anything which may constitute evidence that he is a terrorist.” Between June 2017
and June 2018, the London Metropolitan police stopped and searched 644 people
under this legislation. For the whole of 2017, 767 searches were conducted in
London under s.43.
Unintended Negative Outcomes of Counter-Terrorism Policing: Procedural (in)Justice…
111
Whether they are for the purposes of tackling terrorism or other offences, stop
and search powers allow officers to “allay or confirm suspicions about individuals
without exercising their power of arrest” (PACE Code of Ethics, 2015). The use of
these statutory powers is governed by a code of practice. It entreats officers to act
with fairness and respect towards persons subject these powers, and to eschew
harassment and discrimination. However, there is often a gap between the law and
practice. According to Bowling and Phillips (2007):
The power to stop and search is an investigative power used for the purposes of crime detection or prevention in relation to an individual suspected of a specific offence at a specific
time. In practice however, police officers frequently use stop and search powers for other
purposes such as ‘gaining intelligence’ on people who are ‘known’ to the police, to break
up and move on groups of people, and for the purposes of ‘social control’ more generally.
Although there is no basis in law for the police to use the power to stop and search for these
purposes, the practice is widespread (p. 938).
Research evidence shows that most of police stop and search practices produce false
positives. Ariel and Tankebe (2018) analysed five-year data from a police force in
England and found that 66 percent of police stop and search activities resulted in no
action taken against those individuals – no warnings, formal advice, or arrests. Of
the 767 s.43 searches conducted in London in 2017, only 8 percent resulted in
arrests (Hill 2018). However, false positives are only one of many concerns about
the use of stop and search powers in the UK: for example, there are concerns that
the police disproportionately target minorities and treat them in ways that are disrespectful and undignified. Thus, on the former, Hargreaves (2018) analysed stop and
search data between 2006 and 2011 and found that pedestrians who self-identified
as Muslim were at a slightly higher risk of being stopped. He further found that such
stops for Muslims were eight times more likely than those for any other ethnic or
religious groups to result in searches.
Loader (2006: 211) has put it thus:
Every stop, every search, every arrest, every group of youths moved on, every abuse of due
process, every failure to respond to call or complaint, every racist snub, every sexist remark,
every homophobic joke, every diagnosis of the crime problem, every depiction of criminals – all these send small, routine, authoritative signals about society’s conflicts, cleavages,
and hierarchies, about whose claims are considered legitimate within it, about whose status
identity is to be affirmed or denied as part of it (emphasis added).
Loader’s claims chimes with Tyler’s (2011) assertion that routine interactions
between police officers and civilians are teachable moments that might contribute to
nurturing or squandering legitimacy. In their analysis of survey data from young
people about their stop and search experiences in New York City, Tyler et al. (2014)
found that perceived unfairness of these proactive contacts undermined attitudes
towards the police. In the UK, Bradford (2017) finds that police stops perceived as
unfair undermine overall legitimacy assessments of the police. Thus, what emerges
from this brief excursus is the fraught nature of police stop and search powers, and
the implications for people’s reactions to the law. What remains unexamined is how
far exposure to procedurally (un)just stops affect perceived risk of terrorism recruitment. The results presented below offer some insight.
112
J. Tankebe
Data and Methods
To test the hypothesis that procedural injustice affects perceived risk of recruitment
into terrorism, we needed an experiment that revealed the causal relationship.
Factorial surveys allowed us to accomplish that objective. They involve vignettes
that provide “short descriptions of a person or a social situation which contain precise references to what are thought to be the important factors in the decision-­
making or judgment-making processes of respondents” (Alexander and Becker
1978: 94). Factorial surveys are particularly useful in situations in which there are
challenges to conducting actual experimental manipulations. It was precisely the
situation we faced: it was impossible to obtain police approval randomly to assign
officers in procedural justice scripts for the purposes of testing their effects on risk
of recruitment. Although, factorial designs have their weakness (see Wallander
(2009) for an overview of these designs), they have “the ability to establish causal
inference and isolate underlying mechanisms while using realistic contexts that
alleviate potential concerns about external validity” (Schilke and Rossman 2018: 10).
The Procedure
The study took place between February and March 2018. We contracted a private
research company, Survation, to conduct a nationwide telephone survey of adult (18
and older) Muslims in the United Kingdom. The sampling process involved selecting small geographic units called ‘lower super output areas’ (LSOA) in which people self-identifying as Muslims constituted at least 20 percent of the residents. This
information came from the 2010 national census data. All postcodes belonging to
the selected LSOAs were extracted from a database of active residential postcodes
and the contact details of the residents were retrieved. Survation has developed a
strong ability for targeting through telephone specific individuals according to their
socio-demographic characteristics, increasing the possibility of generating a representative sample of the population. In total, 1019 Muslims responded to researchers’ phone calls of which 798 agreed to participate in the study, representing a
take-up rate of 78.3 percent. Of the 221 who declined involvement, 93 had originally consented but dropped out later in the study; the rest did not start at all.
The researchers explained the purpose of the study and that it was entirely voluntary and anonymous. Each participant was required to indicate expressly whether
they understood the information provided and were happy to consent to take part in
the study; if they declined the researchers thanked them and the call ended. If they
agreed to take part in the study, their consent was recorded, and the interview started
with initial questions on age, gender, educational attainment and employment status. The participants were not offered any incentives for participating in the study.
The study involved four scenarios and each research participant was randomly
assigned to receive only one. The first scenario depicted a fictitious street interaction
Unintended Negative Outcomes of Counter-Terrorism Policing: Procedural (in)Justice…
113
between a young man and police officers in which the officer acted procedurally
justly (high procedural justice condition). It read as follows:
A young Muslim man has recently been released from prison three years ago. He has since been
stopped and searched several times. In recent months, the police demand additional information
from him and they do so in ways that he finds respectful. The young man feels the officers show
care for his well-being and always listen carefully to what he has to say for himself.
The second scenarios also involved a street stop but low in procedural justice:
A young Muslim man has recently been released from prison three years ago. He has since
been stopped and searched several times. In recent weeks, the police demand additional
information from him and do so in a way he finds disrespectful. He feels the officers show
no care for his well-being and they do not take time to listen to what he has to say for
himself.
The third and fourth scenarios described police raids at a Muslim family in which a
young man was arrested on suspicion of terrorism. Given the nature of counter-­
terrorism raids, the experimental treatment focused on police actions after the raid.
The high procedural justice raid condition read as follows:
A family home of one of your friends is raided at night by a special counter-terrorism unit
of police officers, which involved the breaking of the front door. The police entered in their
riot gear, guns and masks. This caused disruption and fear in the family who felt violated by
the police. A young man was arrested but later released without a charge. A police officer
came to the house the next morning to explain the reasons why the officers had carried out
the night time raid, and to listen to the concerns of the family.
In the low procedural justice condition, the research participants were read the following scenario:
The family home of one of your friends is raided at night by a special counter-terrorism unit
of police officers, which involved the breaking of the front door. The police entered in their
riot gear, guns and masks. This caused disruption and fear in the family who felt violated by
the police. A young man was arrested but later released without a charge.
After reading out each scenario, participants were each asked questions that measured perceived risk of recruitment into terrorism. The questions were: (1) “How
likely is it that this young man will be attracted to beliefs that justify the use of
violence to bring change in society?”; (2) “How likely is it that this young man will
engage in violent activity as a way to bring change in society?”; and (3) “How likely
is it that this young man’s experience will lead him to support violent activity as a
way to bring change in society?” the response options ranged from 0 = Not likely at
all to 3 = Extremely likely. The Cronbach alpha reliability score was 0.68 for the
police stops and 0.61 for police raids.
Basic Sample Characteristics
The age of the participants in the procedurally just police stop ranged from 18 to
74 years (M = 35.09) while procedural injustice stops ranged from 18 to 72 years
(M = 33.71). In the case of counter-terrorism raid, the ages of the participants ranged
114
J. Tankebe
from 18 to 85 years for those in procedurally just condition (M = 36.9 years) 18 to
81 years for those in the procedural unjust conditions (M = 36.5 years). Gender is
coded as male = 1 and female = 2. Education is dichotomised into pre-university
education = 1 and university-level education = 2. Personal contacts with police was
coded as ‘no contacts’ = 1 and ‘any contacts’ = 2. A description of the sample is
presented in Table 1.
Results
Independent t-tests were used to compare the mean differences between conditions
of procedural injustice and procedural justice in perceived risk of terrorism recruitment. The results are presented in Table 2. Starting with the police stops scenarios,
we found that perceived risks of recruitment into terrorism was greater for those
exposed to procedurally unjust stops (M = 1.38, SD = 0.58) than those exposed
Table 1 Summary Statistics for Each Experimental Condition
Street Stops
Police Raids
High PJ
Low PJ
High PJ
Age (Mean/SD)
35.1 (SD = 13.9) 33.7 (SD = 12.7) 36.9
(SD = 14.7)
Sex = female
50.8
56.3
52.7
Education = University 39.3
44.8
38.4
Personal contact = Yes 36.8
39.3
45.9
Employment
Full-time
37.6
47.1
37.3
Part-time
18.1
17.5
16.5
Others
44.3
35.5
46.1
Low PJ
36.5 (SD = 14.3)
44.0
44.6
44.1
48.5
12.0
39.5
Table 2 T-tests for Perceived Risk of Terrorism Recruitment
Police Stops
Procedural Procedural
Justice
Injustice
Mean
Mean
(SD)
(SD)
Risk of
1.21
1.38
recruitment (0.53)
(0.58)
Terrorism 1.32
1.38
attraction (0.77)
(0.76)
Terrorism 1.14
1.31
activity
(0.67)
(0.66)
Terrorism 1.17
1.46
support
(0.63)
(0.75)
n
t
df
330 −2.81
328
330 −0.67
328
330 −2.22∗ 328
330 −3.85
∗∗∗
Note. ∗p < .05, ∗∗p < .01, ∗∗∗p < .001
320
Police Raids
Procedural Procedural
Justice
Injustice
Mean
Mean
(SD)
(SD)
1.28
1.33
(0.55)
(0.53)
1.28
1.33
(0.75)
(0.71)
1.29
1.29
(0.72)
(0.771)
1.27
1.37
(0.73)
(0.69)
n
t
df
301 −0.82 299
301 −0.71 299
301 0.04
299
301 0.76
299
Unintended Negative Outcomes of Counter-Terrorism Policing: Procedural (in)Justice…
115
to procedurally just police stops (M = 1.21, SD = 0.53). The magnitude of the difference between the two participants was small, Cohen’s d = −0.31. We disaggregated
the measure of recruitment risk into three specific indicators: attraction to terrorism;
engaging in terrorism activity; and support for terrorism. Perceived risk of attraction
to terrorism did not differ between the procedurally unjust and procedurally just
conditions. However, the research participants exposed to procedurally unjust police
stops perceived a greater risk of the young man engaging in terrorism activity
(Cohen’s d = −0.26) and supporting terrorism (Cohen’s d = −0.42) than those
exposed to procedurally just police stops. Next, we consider the scenarios involving
police counter-terrorism raids at a home. Overall, we found no statistically significant difference in perceptions of the risk of recruitment into terrorism between those
exposed to high procedural justice condition (M = 1.33, SD = 0.53) and those
exposed to low procedural justice raids (M = 1.28, SD = 0.55). Nor did any mean
differences emerge around the individual disaggregated indicators of perceived
recruitment risk.
Discussion and Conclusion
Terrorism is a major security issue for many countries. Consequently, “[u]nderstanding, predicting, and thwarting extreme behavior, particularly as it relates to
violence, is one of the most challenging issues facing humankind” (Gelfand et al.
2013: 495). However, among the key issues in counter-terrorism are the risks of
violent radicalisation and recruitment into terrorism and the extent to which counter-­
terrorism practices might be doing more harm than good. Specifically, there have
been concerns that the nature of counter-terrorism can have unintended negative
effects, increasing rather than reducing the risks of recruitment into terrorism.
Do counter-terrorism practices have unintended negative effects? Using a
nationally-­representative sample of Muslims in the United Kingdom, this chapter
has reported findings from a factorial design that tested the effects of procedural (in)
justice of counter-terrorism practices on perceived risks of recruitment into terrorism. The study offers interesting results with important implications for terrorism
researchers, policy mangers, and counter-terrorism officials. First, we used descriptive analysis to consider the perceived risk of recruitment into terrorism under conditions of procedurally (un)just conditions. We found small and statistically
significant difference in perceived recruitment risk between two conditions relating
to police stops, such that those exposed to procedurally unjust police stops perceived a greater risk of terrorism recruitment than those exposure to procedurally
just stops.
This finding that procedurally unjust street-level encounters are perceived to
pose damaging effect on terrorism prevention would seem consistent with evidence
from procedural justice theory. That evidence shows that poor treatment undermines
people's actual or intended orientations to the law. In Queensland (Australia), police
officers were randomly assigned to receive ‘procedural justice script’ to guide their
116
J. Tankebe
routine interactions with motorists. Survey data from motorists in both control and
experimental conditions were analyzed to test the effects of procedural justice perceptions on people’s orientations towards the police. However, as Jonathan-Zamir,
Hasisi and Margalioth (2016: 632) concluded from their study of passengers subjected to enhanced screening at an airport in Israel: “it is not the case that they can
engage in any intrusive or unpleasant practice, and be perceived positively, just as
long as they follow the principles of procedural justice. Some policing tactics,
which we suspect are particularly harassing or suggest inequity in their distribution,
will likely produce negative emotions even if they are executed in a procedurally-­
just fashion.” Consequently, the results presented above cannot be interpreted as
evidence that the quality of experiences with security agencies play a decisive role
in perceptions of the risk of unintended effects of terrorism recruitment. Indeed, the
differences between our treatment groups in perceptions of risks of recruitment
were small.
Procedural justice theory envisages the application of its principles in the course
of specific decision-making or the general exercise of power. However, in counter-­
terrorism contexts, this expectation cannot be taken for granted. It sometimes happens that counter-terrorism raids occur in highly volatile and potentially dangerous
contexts, leaving little opportunity for the in-situ application of procedural justice
principles. This raises an important question that had hitherto been unaddressed:
what effects do post-operational actions mimicking procedural justice principles
have on the perceived risk of unintended negative consequences of counter-­terrorism
practices? We investigated this question and found no evidence that procedurally
unjust post-raids affected perceived risks of terrorism recruitment.
These findings suggest two things: first, potential differences in procedural justice effects across counter-terrorism practices (street stops versus domestic raids).
Second, the findings might be taken to imply that procedural justice makes no difference to public attitudes if it is a post-facto strategy of community engagement. It
neither attenuates nor worsens the effects of counter-terrorism practices. It is well
known that absence of evidence of effects is not evidence that the effects are absent
(see, Taleb 2007). It sometimes happens that there are methodological limitations
that prevent researchers from detecting effects. In the current study, it is possible
that our design of the vignettes contained weaknesses. Part of the challenge is that
counter-terrorism raids are a rare event, hence a difficulty in finding a sample with
such experiences for a pilot study that could have improved our vignette. Future
studies that address this limitation might advance our knowledge of the effects of
procedural justice beyond the relatively mundane contests in which it has been
tested in much of the extant literature.
To conclude, we have shown that the self-identified Muslims surveyed in the
United Kingdom believed that procedurally unjust police stops increased the likelihood of recruitment into terrorism. To be sure, we measured the participants perceptions of the vulnerability of others rather than themselves. However, given the social
psychological evidence that people tend to project their views onto others (for
example, Kawada et al. 2004), the risk assessments might be indicative of the participants’ own propensities, and therefore what they might be tempted to do if sub-
Unintended Negative Outcomes of Counter-Terrorism Policing: Procedural (in)Justice…
117
jected to counter-terrorism practices that they perceive to be unjust. Finally,
procedure is only one dimension of justice perceptions. Justice also has a substantive dimension, a point that is often underemphasised in the procedural justice literature (For an exception, see Peffley and Hurwitz 2010; Tankebe 2013; Bottoms
and Tankebe 2017; McLean 2019). Critical legal theorists warn that “an appearance
of justice is often fabricated, usually by those in power, and often through deceit”
such that “the offer to ‘hear you out,’ to ‘invite your participation,’ to ‘listen to what
you have to say (for yourself)’” sometimes distracts us from injustices in society
(Cohen 1989: 32). Counter-terrorism policing is not immune to that caution.
Acknowledgement This research was supported by funding from the European Union’s Horizon
2020 research and innovation programme under grant agreement #699824.
References
Alexander, C. S., & Becker, H. J. (1978). The use of vignettes in survey research. Public opinion
Quarterly, 42(1), 93–104.
Annan, K. (2003). Ability to reason vital in fighting terrorism, Secretary-General Tells Conference.
Available at https://www.un.org/press/en/2003/sgsm8885.doc.htm Accessed 22 September
2018.
Ariel, B., & Tankebe, J. (2018). Racial stratification and multiple outcomes in police stops and
searches. Policing and Society, 28(5), 507–525.
Augustyn, M. B. (2015). The (ir)relevance of procedural justice in the pathways to crime. Law and
Human Behavior, 39(4), 388–401.
Beetham, D. (1991). The legitimation of power (1st ed.). London: Palgrave Macmillan.
Beetham, D. (2013). The legitimation of power (2nd ed.). Basingstoke: Palgrave Macmillan.
Blumer, H. (1954). What is wrong with social theory? American Sociological Review, 19(1), 3–10.
Borum, R. (2011). Radicalization into violent extremism I: A review of social science theories.
Journal of Strategic Security, 4(4), 7–36.
Bottoms, A. E., & Tankebe, J. (2012). Beyond procedural justice: a dialogic approach to legitimacy
in criminal justice. Journal of Criminal Law and Criminology, 102,119–70.
Bottoms, A., & Tankebe, J. (2017). Police legitimacy and the Authority of the State. In M. Ulväng,
A. du Bois-Pedain, & P. Asp (Eds.), Criminal Law and the Authority of the State (pp. 47–88).
Oxford: Hart Publishing.
Bowling, B., & Phillips, C. (2007). Disproportionate and discriminatory: Reviewing the evidence
on police stop and search. The Modern Law Review, 70(6): 936–961.
Bradford, B. (2017). Stop and search and police legitimacy. London: Routledge.
Choudhury, T., & Fenwick, H. (2011). The impact of counter-terrorism measures on Muslim communities. International Review of Law, Computers & Technology, 25(3), 151–181.
Cohen, R. L. (1989). Fabrications of justice. Social Justice Research, 3, 31–46.
Cronin, A. K. (2009). How terrorism ends: Understanding the decline and demise of terrorist
campaigns. Princeton: Princeton University Press.
Dalgaard-Nielsen, A. (2010). Violent radicalization in Europe: What we know and what we do not
know. Studies in Conflict & Terrorism, 33(9), 797–814.
Della Porta, D. (2018). Radicalization: A relational perspective. Annual Review of Political
Science, 21(1), 461–474.
Doosje, B., Loseman, A., & Van Den Bos, K. (2013). Determinants of radicalization of Islamic
youth in the Netherlands: Personal uncertainty, perceived injustice, and perceived group threat.
Journal of Social Issues, 69(3), 586–604.
118
J. Tankebe
Dunn, J. (2013). Legitimacy and democracy in the world today. In J Tankebe & A Liebling (eds.),
Legitimacy and criminal justice: An international exploration,Oxford: Oxford University Press.
Gelfand, M. J., LaFree, G., Fahey, S., & Feinberg, E. (2013). Culture and extremism. Journal of
Social Issues, 69(3), 495–517.
Hargreaves, J. (2018). Police stop and search within british muslim communities: Evidence from
the crime survey 2006–11. British Journal of Criminology, 58(6), 1281–1302.
Hill, M. (2018). The Terrorism Acts in 2017. Available at https://terrorismlegislationreviewer.independent.gov.uk/wp-content/uploads/2018/10/The_Terrorism_Acts_in_2017.pdf [Accessed 22
November 2018].
Home Office. (2018). CONTEST: The United Kingdom’s Strategy for Countering Terrorism (Cm
9608): Annual Report. London: The Stationery Office.
Hyde, A. (1983). The concept of legitimation in the sociology of law. Wisconsin Law Review, 1983,
379–426.
Jackson, J., Bradford, B., Stanko, B., & Hohl, K. (2012). Just authority?: Trust in the police in
England and Wales. Oxford: Routledge.
Jonathan-Zamir, T., Hasisi, B., & Margalioth, Y. (2016). Is it the what or the how? The roles of
high-policing tactics and procedural justice in predicting perceptions of hostile treatment: The
case of security checks at Ben-Gurion Airport, Israel. Law & society review, 50(3), 608–636.
Kawada, C. L., Oettingen, G., Gollwitzer, P. M., & Bargh, J. A. (2004). The projection of implicit
and explicit goals. Journal of Personality and Social Psychology, 86(4), 545–559.
Kearns, E. M., Ashooh, E., & Lowrey-Kinberg, B. (2019). Racial differences in conceptualizing
legitimacy and trust in police. American Journal of Criminal Justice, 1–25.
LaFree, G., Jensen, M. A., James, P. A., & Safer-Lichteinstein, A. (2018). Correlates of violent
political extremism in the United States. Criminology, 56(2), 233–268.
Loader, I. (2006). Policing, recognition, and belonging. The Annals of the American Academy of
Political and Social Science, 605(1), 201–221.
Lowrey, B. V., Maguire, E. R., & Bennett, R. R. (2016). Testing the effects of procedural justice and overaccommodation in traffic stops: A randomized experiment. Criminal justice and
Behavior, 43(10): 1430–1449.
MacCormick, N. (2007). Institutions of law. Oxford: Oxford University Press.
MacQueen, S., & Bradford, B. (2015). Enhancing public trust and police legitimacy during
road traffic encounters: Results from a randomised controlled trial in Scotland. Journal of
Experimental Criminology, 11(3), 419–443.
Mazerolle, L., Antrobus, E., Bennett, S., & Tyler, T. R. (2013). Shaping citizen perceptions of
police legitimacy: A randomized field trial of procedural justice. Criminology, 51, 33–63.
McCauley, l., & Moskalenko, S. (2008). Mechanisms of political radicalization: Pathways towards
terrorism. Terrorism and Political Violence, 20(3), 415–433.
McLean, K. (2019). Revisiting the role of distributive justice in Tyler’s legitimacy theory. Journal
of Experimental Criminology. https://doi.org/10.1007/s11292-019-09370-5.
Mumpower, J. L., Shi, L., Stoutenborough, J. W., & Vedlitz, A. (2013). Psychometric and demographic predictors of the perceived risk of terrorist threats and the willingness to pay for terrorism risk management programs. Risk Analysis, 33(10), 1802–1811.
Murphy, K., Cherney, A., & Teston, M. (2019). Promoting Muslims’ willingness to report terror
threats to police: testing competing theories of procedural justice. Justice Quarterly, 36(4),
594–619.
Murphy, K., Madon, N. S., & Cherney, A. (2017). Promoting Muslims’ cooperation with police
in counter-terrorism: The interaction between procedural justice, police legitimacy and law
legitimacy. Policing: An International Journal, 40(3), 44–559.
Murray, A., Mueller-Johnson, K., & Sherman, L. W. (2015). Evidence-based policing of UK
Muslim communities: linking confidence in the police with area vulnerability to violent
extremism. International criminal justice review 25(1), 64–79.
Nagin, D. S., & Telep, C. W. (2017). Procedural justice and legal compliance. Annual Review of
Law and Social Science, 13, 5–28.
Unintended Negative Outcomes of Counter-Terrorism Policing: Procedural (in)Justice…
119
Pantazis, C., & Pemberton, S. (2009). From the ‘Old’ to the ‘New’ suspect community examining the impacts of recent UK counter-terrorist legislation. The British Journal of Criminology,
49(5), 646–666.
Peffley, M., & Hurwitz, J. (2010). Justice in America: The separate realities for blacks and whites.
Cambridge: Cambridge University Press.
Reisig, M. D., Mays, R. D., & Telep, C. W. (2018). The effects of procedural injustice during
police–citizen encounters: A factorial vignette study. Journal of Experimental Criminology,
14(1), 49–58.
Schilke, O., & Rossman, G. (2018). It’s only wrong if it’s transactional: Moral perceptions of
obfuscated exchange. American Sociological Review, 83, 1079–1107.
Slocum, L. A., & Wiley, S. A. (2018). “Experience of the expected?” Race and ethnicity differences in the effects of police contact on youth. Criminology, 56(2), 402–432.
Sunshine, J., & Tyler, T. R. (2003). The role of procedural justice and legitimacy in shaping public
support for policing. Law & Society Review, 37, 513–48.
Taleb, N. N. (2007). The Black Swan: The Impact of the Highly Improbable. New York: Random
House.
Tankebe, J. (2013). Viewing things differently: The dimensions of public perceptions of police
legitimacy. Criminology, 51(1), 103–135.
Tankebe, J., Reisig, M. D., & Wang, X. (2016). A multidimensional model of police legitimacy: A
cross-cultural assessment. Law and Human Behavior, 40(1), 11–22.
Tankebe, J., Boakye, K. E., & Amagnya, A. M. (2019). Traffic violations and cooperative intentions among drivers: The role of corruption and fairness. Policing and Society, 1–16. https://
doi.org/10.1080/10439463.2019.1636795.
Tyler, T. R. (1990). Why people obey the law (1st ed.). New Haven: Yale University Press.
Tyler, T. R. (2000). Multiculturalism and the Willingness of Citizens to Defer to Law and to Legal
Authorities. Law & Social Inquiry, 25(4): 983-1019
Tyler, T. R. (2006). Why people obey the law (2nd ed.). Princeton: Princeton University Press.
Tyler, T. R. (2011). Trust and legitimacy: Policing in the USA and Europe. European Journal of
Criminology, 8, 254–266.
Tyler, T. R., & Huo, Y. (2002). Trust in the law: Encouraging public cooperation with the police
and courts. New York: Sage.
Tyler, T. R., Schulhofer, S., & Huq, A. Z. (2010). Legitimacy and deterrence effects in counterterrorism policing: A study of Muslim Americans. Law & Society Review, 44(2), 365–402.
Tyler, T. R., Fagan, J., & Geller, A. (2014). Street stops and police legitimacy: Teachable moments
in young urban men’s legal socialization. Journal of Empirical Legal Studies, 11(4), 751–785.
Waddington, P. J., Williams, K., Wright, M., & Newburn, T. (2015). Dissension in public evaluations of the police. Policing and Society, 25, 212–235.
Wallander, L. (2009). 25 years of factorial surveys in sociology: A review. Social Science Research,
38(3), 505–520.
Weisburd, D., & Majmundar, M. K. (2018). Proactive Policing: Effects on Crime and Communities.
Washington, DC: The National Academies Press.
Worden, R. E., & McLean, S. J. (2017). Mirage of police reform: Procedural justice and police
legitimacy. Oakland, CA: University of California Press.
The Link Between Prior Criminal Record
and Violent Political Extremism
in the United States
Michael A. Jensen, Aaron Safer-Lichtenstein, Patrick A. James,
and Gary LaFree
Introduction
Research on radicalization1 has progressed a great deal over the past decade, as
scholars have incorporated views from economics, political science, psychology,
and sociology into increasingly comprehensive explanations of violent extremism.
While criminology has been somewhat slower than some of the other social sciences to fully engage in the study of radicalization and violent extremism, the situation is changing rapidly (Forst et al. 2011; LaFree and Freilich 2017). Research on
political extremism now routinely appears in major criminology outlets, criminology students are defending theses and dissertations on related topics, and meetings
of professional criminology associations have a strong representation of terrorism-­
related research. Indeed, recent efforts (Jensen et al. 2016; LaFree et al. 2018) to
bring criminological insights into the study of political extremism have found that
common criminological correlates explain a good deal of extremist behavior.
We adopt the FBI definition of radicalization as “the process by which individuals come to believe
their engagement in or facilitation of nonstate violence to achieve social and political change is
necessary and justified” (Hunter and Heinke 2011).
1
This research was supported by the European Union’s Horizon 2020 research and innovation program under award number 699824, the National Institute of Justice through award number 2012-­
ZA-­BX-0005, and the Department of Homeland Security Science and Technology Directorate’s
Office of University Programs through Award Number 2012-ST-061-CS0003. The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the European Union, the
U.S. Department of Justice, or the U.S. Department of Homeland Security.
M. A. Jensen (*) · A. Safer-Lichtenstein · P. A. James · G. LaFree
University of Maryland, College Park, MD, USA
e-mail: majensen@umd.edu
© Springer Nature Switzerland AG 2020
D. Weisburd et al. (eds.), Understanding Recruitment to Organized Crime
and Terrorism, https://doi.org/10.1007/978-3-030-36639-1_6
121
122
M. A. Jensen et al.
At the heart of these efforts is the question of how similar terrorism-related crime is
to more ordinary types of crime. Criminologists Clarke and Newman (2006) see the
overlap as complete, claiming that “terrorism is a form of crime in all essential respects.”
While LaFree and Dugan (2015) substantially agree with this conclusion, they point
out that there are nonetheless important differences between terrorism-­related crime
and more ordinary types. Perhaps most notably, in contrast to many who engage in terrorist activity, ordinary criminals rarely see their illegal actions as altruistic.
Nonetheless, it seems clear that terrorist behavior shares much with ordinary
crime. Of particular importance for the future of terrorism research are the recent
findings (Jensen et al. 2016, 2018; LaFree et al. 2018) that previous non-ideological
criminality—a correlate that is included in most etiological studies of crime—may
help distinguish extremists who participate in acts of politically motivated violence
from those who commit illegal actions driven by political motives, but do not reach
the threshold of violence. For example, several studies of terrorism in the United
States (Gruenewald et al. 2013; Jensen et al. 2016, 2018; LaFree et al. 2018) have
found that extremists are more likely to engage in violence in pursuit of their political ambitions if they have a history of engaging in criminal acts prior to radicalizing.
Similar results have been found in the radicalization processes of European jihadists
(Basra and Neumann 2016).
Taken as a whole, the evidence suggests that criminological perspectives emphasizing the link between previous criminality and future criminality is important for
understanding political extremism. While radicalization experts have begun to
explore these links, several important questions about the relationship between previous criminal behavior and extremist violence remain. For example, very little is
known about how frequently extremists engage in non-ideological crimes prior to
radicalizing or which crimes they are most likely to commit. Similarly, the field of
terrorism studies has yet to address whether juvenile offending (in contrast to adult
offending) changes the risk calculus for violence among political extremists. This
chapter seeks to build on the emerging body of research that explores the relationship between established correlates of crime developed in the criminology literature
and the etiology of violent extremism by addressing these questions.
Using data from the newly released Profiles of Individual Radicalization in the
United States (PIRUS) database, we explore the criminal histories and extremist
behaviors of nearly 1900 individuals who radicalized in the United States since
1948. Our results reveal that pre-radicalization criminal behavior, violent or nonviolent, is the single strongest non-ideological predictor of post-radicalization violence among U.S. extremists. However, we find that the criminal backgrounds of
U.S. extremists vary considerably depending on individuals’ ideological affiliations. Individuals on the extremist far-right, especially those motivated by white
supremacist views, are substantially more likely to engage in crime prior to radicalizing than are individuals associated with other ideologies. We also find that
U.S. extremists rarely specialize in specific crime types prior to or after radicalizing. Rather, individuals in the PIRUS data with criminal histories are often repeat
offenders who engaged in violent and non-violent crimes or non-violent criminals
who escalated to violent crime once they radicalized. Finally, we find that while the
The Link Between Prior Criminal Record and Violent Political Extremism in the United… 123
rates of juvenile offending among U.S. extremists are not substantially higher than
they are for the general population, individuals who engage in criminal activity
before the age of 18 are significantly more likely than non-juvenile offenders to
engage in acts of violent extremism after radicalizing.
This chapter proceeds in five sections. First, we review the criminological literature on the link between past and future crime, as well as recent attempts by terrorism scholars to bring criminological theory into the study of extremists. Second, we
describe the PIRUS data and the additional data collection that we conducted to
explore the link between previous criminality and violent extremism. Third, we
present descriptive findings on the past criminal behaviors of U.S. extremists,
including how crime rates compare across ideologies and whether juvenile crime is
present at higher rates in the backgrounds of violent extremists. Fourth, we present
a multivariate analysis that tests the relationships between a number of ideological
and non-ideological correlates and violent extremism, including the effect that pre-­
radicalization crime has on the odds that an extremist will engage in violence after
radicalizing. Finally, we conclude by considering the implications of this research
for terrorism prevention policy and future studies of terrorism.
Literature Review
While terrorism studies have begun to establish links between non-ideological
criminal behavior and extremism, important research gaps remain. Criminological
investigations of ordinary crime often emphasize the role that previous criminality,
crime diversity, and juvenile offending play in the development of criminal trajectories. In particular, these factors may be important in an offender’s evolution towards
increasingly extreme forms of delinquency, including acts of criminal violence.
Below, we review the criminological research on these issues and assess the extent
to which they have been addressed by terrorism researchers.
Previous Criminal Behavior
Decades of criminological research has consistently found a robust relationship
between prior deviance and subsequent criminal behavior (Blumstein et al. 1988;
Loeber and Le Blanc 1990). Indeed, most actuarial assessments of sentencing,
parole, and probation decisions rely on prior criminal record (Hoffman and Beck
1974; Hoffman et al. 1978; Monahan and Skeem 2015). In an influential meta-­
analysis of the predictors of adult offender recidivism, Gendreau et al. (1996) examined 131 prior studies and found criminal history to be among the strongest
predictors of future criminal activity. Similarly, DeLisi et al. (2013) found that prior
police contact and arrest were predictive of future violent crime.
But while the association between criminal record and ordinary crime is well
established, there is far less research on the connection between criminal record and
124
M. A. Jensen et al.
political violence (Cottee 2016).2 Only recently, a few studies have included criminological variables in analyses predicting violent extremism. For example,
Gruenewald et al. (2013) examined the correlates of far-right loner and far-right
group-motivated homicides, including the impact of criminogenic factors. The
authors found that 29 out of 47 (61.7%) loners and 47 out of 92 (51.1%) group-­
motivated extremists had prior arrests; 16 out of 29 loners (55.2%) and 21 out of 47
(44.7%) group-motivated offenders had violent criminal histories. Similarly, a
recent LaFree et al. (2018) study examined correlates of violent extremism in a
sample of U.S. extremists and found that 40% of the subjects engaged in crime prior
to adopting extremist beliefs. These rates exceed most contemporary estimates of
cumulative arrest histories in the general population (Brame et al. 2014). While
there is no official measure of crime prevalence in the U.S., Brame et al. (2014)
estimate that 25–41% of young adults in the U.S. have an arrest history (though
subsequent research has found that these rates vary significantly across measures of
gender and race) and the Federal Bureau of Investigation maintains felony arrest
records for approximately one third of the U.S. population (Clark 2017). Substantial
evidence of prior criminal records among political extremists has been reported by
national police and intelligence agencies outside of the U.S. as well. For example,
officials from Germany, Norway, and the Netherlands reported that more than 60%
of the individuals that traveled from their countries to join the Islamic State in Syria
and Iraq had previous criminal records (Basra and Neumann 2016).
Importantly, recent studies (Jensen et al. 2016, 2018; LaFree et al. 2018) have
found that non-ideological criminal behavior prior to radicalization often distinguishes violent from non-violent extremists. For example, in a multivariate study,
LaFree et al. (2018) discovered that U.S. extremists with criminal backgrounds
were significantly more likely to adopt violence after radicalizing than were extremists without crime histories. Similarly, using an expanded and updated sample,
Jensen et al. (2018) built on the LaFree et al. study and found that previous crime
was the strongest non-ideological predictor of post-radicalization violent extremism
when comparing more than 1800 violent and non-violent U.S extremists. Both the
LaFree et al. and Jensen et al. studies used large samples and controlled for a number of ideological and non-ideological factors, indicating that the link between pre-­
radicalization crime and post-radicalization violence is robust.
Crime Specialization and Diversity
Criminologists have long investigated whether criminals specialize in specific types
of criminal behavior or whether they are generalists who engage in diverse forms of
crime and delinquency. While not all research supports the vision of ordinary
While studies at the individual-level are rare, there are numerous studies at the group-level on the
terror-crime nexus (Hutchinson and O’malley 2007; Picarelli 2006, 2012; Sanderson 2004; Toros
and Mavelli 2013).
2
The Link Between Prior Criminal Record and Violent Political Extremism in the United… 125
c­ riminals as generalists (Kempf 1987; Lussier et al. 2005; Shover 1996), a growing
consensus in the research on criminal trajectories finds that while there is some
evidence of specialization, most criminal careers are marked by “versatile offending
patterns” (Blumstein et al. 1986, p. 455; Piquero et al. 2003; Wolfgang et al. 1972).
For example, in a study of a Philadelphia youth cohort, Piquero (2000) found that
there was no evidence for specialization in offending. Rather, some non-violent
offenders eventually engaged in acts of criminal violence in addition to increasing
their offending frequency as they grew older. However, more recent research suggests that offending over the criminal career may vary considerably (Deane et al.
2005; Shover 1996; Steffensmeier and Ulmer 2005; Sullivan et al. 2006). For example, it appears that both individual-level propensity to commit crime, as well as
changes in life circumstances (e.g., employment, marriage, drug and alcohol use),
impact patterns of offense specialization/versatility in the short term (McGloin
et al. 2007).
While research on criminal specialization may provide valuable insights into the
processes by which extremists evolve from engaging in more ordinary types of non-­
violent crime to acts that are intended to injure or kill, only a few terrorism studies
to date have touched on this issue. For example, in a study of 79 European jihadists
with criminal records, Basra and Neumann (2016) found that the majority had committed petty crimes prior to plotting domestic terrorist attacks or traveling to fight in
foreign conflicts. Similarly, Jensen et al. (2018) found that many individuals who
went on to commit acts of political violence in the United States had previous criminal records that were limited to non-violent crimes, such as theft and drug offenses.
Although these studies have begun to address the criminal life-course of extremists,
there is a near absence of information on the non-ideological crime patterns of those
who have committed terrorism. Thus, there are very few studies that provide criminal offending rates for political extremists or offer data on the types of crimes that
political extremists engage in prior to radicalizing. Moreover, there are few comparisons of the criminal pasts of non-violent and violent extremists, including
whether multiple offending or criminal diversity is more or less prevalent in their
backgrounds.
Age of Onset and Violent Crime
In the 1980s and 1990s, a great deal of criminological research concentrated on
understanding the impact of early offending on the nature, severity, and duration of
criminal activity over an individual’s life-course (Blumstein et al. 1986; Farrington
1992; Laub and Sampson 1993). Unsurprisingly, the results of this research showed
that the age of onset of criminal activity is a reliable predictor of a number of future
criminal outcomes. For instance, in Glueck and Glueck’s (1950) classic analysis of
500 boys growing up in Boston, the authors found that age of onset was significantly related to both criminal career length and frequency of offending. Further, in
Wolfgang et al.’s (1972) influential Philadelphia study, the authors found that early
126
M. A. Jensen et al.
age of onset was related to both the persistence and severity of offending. That is,
individuals who committed their first crime at an earlier age were significantly more
likely to commit serious offenses in the future. The relationship appears to be so
robust across studies and variables (Hingson et al. 2006; Kaplow and Widom 2007;
Robins and Przybeck 1985) that some scholars declare age of onset to be the best
predictor of the future course of one’s criminal career (Blumstein et al. 1985;
Gottfredson and Hirschi 1990).
While there is a growing body of terrorism research that looks at the recruitment
of children into extremist organizations (Beber and Blattman 2013; Rosen 2005),
we are unaware of any studies that examine the relationship between juvenile non-­
ideological crime and later involvement in violent extremism.
Research Questions
While the previous studies (Jensen et al. 2016, 2018; LaFree et al. 2018) that have
explored pre-radicalization criminality and post-radicalization violent extremism
offer promising insights into the proccesses of radicalization to violence, important
research gaps remain. In particular, past studies have not estimated the strength of
the association between past non-ideological crimes and acts of political violence,
relying instead on descriptive analyses and case studies. Nor has extant research
analyzed the particular types of crime or offender characteristics that may be linked
to a greater propensity for violent extremism. To fill these gaps, this chapter
addresses the following questions:
• How does the risk calculus for violent extremism change if an individual has a
history of non-ideological criminal behavior? Is an individual with a history of
non-ideological violent offending at a greater risk of engaging in violent extremism once they have radicalized?
• Are there significant cross-ideological differences in the criminal histories of
U.S. extremists?
• Which pre-radicalization non-ideological criminal behaviors are most prevalent
among extremists with criminal histories?
• Are individuals who commit non-extremist crimes as juveniles at an increased
risk for engaging in violent extremism once they have radicalized?
Data
Data for this study were drawn from the Profiles of Individual Radicalization in the
United States (PIRUS) dataset, which contains individual-level information on the
backgrounds, attributes, and radicalization processes of 1867 violent and non-­
violent U.S. political extremists. The PIRUS data include individuals who adhered
The Link Between Prior Criminal Record and Violent Political Extremism in the United… 127
to far-left, far-right, Islamist, or single-issue ideologies and radicalized in the United
States from 1948 to 2016.3 The PIRUS data were collected using publicly available
sources, with priority given to information from well-regarded and reliable sources,
such as professional news media outlets, unsealed court records, and unclassified
government reports. In addition, researchers used websites that had uncertain reliability but contained links to reliable documents, such as court transcripts.
START researchers compiled the PIRUS dataset over multiple waves of data collection between 2013 and 2017. During the data collection phase, trained researchers double-coded approximately half of the sample (described below) in order to
increase the overall quality of the data, as well as to assess the reliability of the
coding instrument. At the end of each coding wave, researchers performed
Krippendorf’s alpha procedure to test for inter-rater reliability across the double-­
coded cases (Krippendorf and Hayes 2007). Each wave scored above a 0.7, which
indicates acceptable reliability for social science applications. After conducting reliability tests, project leaders reviewed all instances of discrepant coding and made a
final coding decision that best represented information available in the open sources
and most closely aligned with definitions laid out in the PIRUS codebook.
To be included in the PIRUS dataset, individuals must meet three requirements:
(1) their radicalization began or occurred primarily in the United States; (2) they
espoused clearly identifiable ideological motives; and (3) their terrorism related
behavior was linked to the ideological motives they espoused.4 In addition to these
criteria, individuals must meet at least one of the following criteria: (4a) they were
arrested; (4b) indicted of a crime; (4c) killed as a result of their ideological activities; (4d) were a member of a designated terrorist organization; or (4e) were associated with an organization whose leader(s) or founder(s) has been indicted of
ideologically motivated violent offenses.
Many studies of political violence based on open source data have substantial
amounts of missing data on key variables (Chermak et al. 2012; Dugan and Distler
2016; LaFree et al. 2018; Safer-Lichtenstein et al. 2017). While our main dependent
variable—violent/non-violent—and several other variables (gender, ideology, and
exposure year) include no missing values, the remaining variables have a wide
range of missing data. At the most extreme, one variable—presence of a radical
family member—is missing data in more than 80% of the cases. Three additional
variables (stable employment history, education level, and presence of rival groups)
are missing in more than 60% of the cases. For the descriptive analysis we simply
exclude cases with missing data. For our multivariate analysis we estimate models
using regression-based multiple imputation (Rubin 2004). This process is described
in greater detail below.
3
For a detailed explanation of these ideological categories, see http://www.start.umd.edu/sites/
default/files/files/research/PIRUSCodebook.pdf
4
For additional details on the PIRUS dataset and data collection methodology, please refer to the
project’s
final
report,
available
at
https://www.start.umd.edu/pubs/START_NIJ_
EmpiricalAssessmentofDomesticRadicalizationFinalReport_Dec2016_0.pdf
128
M. A. Jensen et al.
Of the individuals in PIRUS, we classified 1103 (59.1%) as violent extremists,
defined as individuals who conspired to or committed acts intended to kill or injure,
while 764 (40.9%) were coded as non-violent extremists, defined as individuals
who limited their extremist acts to those which did not threaten others’ physical
wellbeing, including vandalism, illegal protest, material support, and the destruction of uninhabited property.
A subset of 397 (21.3%) individuals in PIRUS were coded as having pre-­
radicalization criminal histories, which we define as any criminal act (aside from
non-felony drug use or moving traffic violations) with a non-ideological motive that
was committed before an individual adopted an extremist belief system. Neither
arrest nor conviction were required for an individual to be coded as committing pre-­
radicalization criminal offenses, although in most cases the individual did have
some kind of interaction with the criminal justice system. Individuals were also
coded as having a criminal history if they self-reported engaging in criminal acts
prior to radicalizing, even if they were never arrested or charged for a crime. In
order to address the research questions described above, we added several additional variables to the PIRUS data for each individual in the subsample:
• Previous criminal activity: an ordinal variable that records the most extreme
crime that an individual committed prior to radicalizing: 0 = no previous criminal history, 1 = misdemeanor non-violent crime; 2 = felony non-violent crime;
3 = any violent crime.
• Criminal activity type: a categorical variable that captures the nature of criminal
offenses that an individual committed prior to radicalizing.5
• Criminal activity age: a categorical variable that captures the age at which an
individual was first known to engage in non-ideological crime: 1 = under 18 years
old, 2 = 18–24 years old, 3 = 25–34 years old, 4 = 35–44 years old, 5 = 45 years
old and older.
Descriptive Results
We begin with a descriptive analysis of crime rates for individuals in PIRUS, as well
as a comparison of the criminal histories of perpetrators across different ideological
milieus. This allows us to provide a detailed examination of the sub-ideological
affiliations of individuals in PIRUS with histories of pre-radicalization crime. We
then analyze the specific types of crime that were most common in the pre-­
radicalization histories of the individuals in PIRUS, paying particular attention to
the crimes that were most prevalent in the backgrounds of violent extremists.
Finally, we examine the nexus between age of criminal onset and the likelihood that
individuals engage in acts of political violence after they have adopted an extremist
If an individual committed more than three crime types, coders were instructed to select the three
most serious offenses and list the remaining offenses in an additional text box.
5
The Link Between Prior Criminal Record and Violent Political Extremism in the United… 129
belief system. In particular, we assess whether there is a significant link between
juvenile non-ideological delinquency and post-radicalization violent extremism.
Pre-radicalization Crime Rates of U.S. Extremists
As noted above, we found that 397 (21.3%) subjects engaged in at least one criminal
act prior to radicalizing. Of the remaining cases, 608 (32.5%) were confirmed to
have no prior criminal record, while 862 (46.2%) were coded as “unknown” for
criminal history due to incomplete source documents. Below we discuss in greater
detail the strategies we use to compensate for these missing values and how they
impact our results. Of the 397 individuals in PIRUS who were coded as having pre-­
radicalization criminal records, 200 (50.4%) engaged exclusively in non-violent
crimes, such as drug offenses, theft, and vandalism. The remaining individuals were
divided between those who engaged exclusively in violent criminal acts (n = 78;
39.6%) and those who committed a mix of violent and non-violent crimes (n = 119;
60.4%). Nearly half (48.9%) of the individuals in PIRUS with criminal histories
engaged in multiple crimes prior to engaging in ideologically motivated criminal
behavior.
In Fig. 1, we compare non-violent and violent political extremists who have no
criminal history, a non-violent criminal history, and a violent criminal history.
Approximately 44% of the violent extremists and 32% of the non-violent extremists
in PIRUS committed at least one criminal offense prior to radicalizing. Further, the
data reveal important differences in the criminal histories of violent and non-violent
extremists. For example, individuals who went on to engage in acts of violent
extremism after radicalizing were significantly more likely to have committed acts
67.81%
56.07%
No Criminal History
Non-Violent Criminal History
24.44%
20.58%
19.49%
11.61%
Non-Violent Extremists (n=764)
Violent Extremists (n=1103)
Fig. 1 Rates of pre-radicalization crime in the PIRUS database
Violent Criminal History
130
M. A. Jensen et al.
Table 1 Rates of criminal histories among individuals in PIRUS (by primary ideology)
No criminal history
History of misdemeanor non-violent crime
History of felony non-violent crime
History of violent crime
Far-right
45.76%
13.28%
14.12%
26.84%
Far-left
71.93%
8.77%
4.09%
15.20%
Islamist
65.96%
9.42%
7.60%
17.02%
Single-issue
70.20%
10.60%
5.96%
13.25%
of violent crime prior to radicalizing than their non-violent extremist counterparts.
Nearly 25% of the violent extremists in PIRUS had pre-radicalization criminal histories that included acts of violence, whereas violent crime was only present in the
criminal histories of 12% of non-violent extremists.
In Table 1, we compare the criminal histories of the individuals in PIRUS. The
results show considerable variation across our four primary ideological categories:
far-right, far-left, Islamist, and single-issue extremists.6 According to Table 1, far-­
right extremists in the PIRUS data display the highest rates of pre-radicalization
crime, including the highest rates of previous violent offenses. While only 54% of
far-right extremists in PIRUS had no criminal history, 72% of far-left extremists,
70% of single-issue extremists, and 66% of Islamists had no prior criminal activity.
Approximately 27% of far-right extremists in the data had criminal histories that
included acts of violent crime, such as homicide, armed assaults, and sexual violence. By comparison, 17% of Islamists, 15% of far-left extremists, and 13% of
single-issue extremists had criminal histories that included violent crime.
Interestingly, while individuals on the far-left commonly engaged only in acts of
non-violent political extremism after radicalizing (64.8%), those with criminal histories often (53.5%) committed acts of violent non-ideological crime prior to radicalizing. Nearly 35% of the Islamist extremists in PIRUS engaged in criminal acts
prior to radicalizing. Those with pre-radicalization criminal histories were evenly
split between those whose criminal acts were limited to non-violent offenses and
those whose crimes included acts of violence. Finally, 30% of individuals in PIRUS
who were classified as single-issue extremists had histories of criminal behavior
prior to radicalizing, including 13% who committed acts of violent crime.
In Table 2, we examine the extremists in PIRUS with criminal histories according to their sub-ideological affiliations. According to Table 2, the high rate of previous criminality on the far-right is primarily driven by individuals who harbored
white supremacist or Neo-Nazi views. Indeed, nearly 65% of far-right extremists in
PIRUS with previous criminal records eventually radicalized to adopt beliefs of
white racial supremacy. Extremists who expressed anti-government views, such as
Sovereign Citizens, also constitute a substantial portion (32.8%) of the far-right
cases in PIRUS with previous criminal histories.
Similar patterns of previous criminality are also found for the other sub-­
ideologies. For example, individuals affiliated with the Black nationalist/separatist
movements of the 1960s and 1970s make up the largest portion (50%) of extremists
6
For detailed descriptions of the ideological categories, see Jensen et al. (2016).
The Link Between Prior Criminal Record and Violent Political Extremism in the United… 131
Table 2 # of individuals in PIRUS with criminal histories (by sub-ideology)
Ideology/sub-ideology
Far-right
Militia/gun rights
White supremacist/KKK/Neo-Nazi
Xenophobic/anti-immigrant
Anti-government/Sovereign Citizens movement
Christian identity
Far-left
Animal rights/environmentalist
New Left (1960’s student movements/anti-Vietnam
War)
Black nationalist/black separatist
Anti-capitalist/communist/anti-imperialist
Anarchist
Islamist
Al-Qaeda affiliated/inspired
Islamic State affiliated/inspired
Unaffiliated Salafist/other
Single-issue
Puerto Rican independence/Puerto Rican nationalist
Cult/idiosyncratic
Anti-abortion
Anti-gay
Other
# of individuals with criminal
history
192
22
124
13
63
10
48
11
7
24
6
7
112
34
41
37
45
1
2
21
8
18
Note: Subjects can be coded for more than one ideological subcategory
on the far-left with pre-radicalization criminal histories. Islamist extremists in
PIRUS with pre-radicalization criminal backgrounds appear to be evenly divided
between those who aligned with or were inspired by Al-Qaeda and its associated
movements (AQAM) and those who aligned with or were inspired by the Islamic
State of Iraq and Syria (ISIS; 30.3% and 36.6% respectively). Previous criminality
among single-issue extremists in PIRUS is most prevalent in the backgrounds of
anti-abortion extremists.
Pre-radicalization Criminal Activity of U.S. Extremists
Figure 2 shows the range of criminal activities that the perpetrators in PIRUS engaged
in prior to radicalizing. These behaviors included a number of violent offenses, such
as homicide, assault, and sexual violence, and a long list of non-violent crimes,
including drug offenses, theft, vandalism, and fraud.
132
M. A. Jensen et al.
Aggravated Assault
Drug Related
Simple Assault
Illegal Use/Possession of Firearm
Robbery
Larceny-Theft
Burglary
Fraud
Driving Under the Influence (DUI)
Homicide
Vandalism
Motor Vehicle Theft
Arson
Forcible Rape
Forgery
Prostitution
Parole Violation
Embezzlement
22.92%
18.14%
15.11%
14.61%
14.11%
12.34%
9.82%
7.81%
7.05%
5.29%
3.53%
Violent Crime
Non-Violent Crime
3.27%
3.02%
2.52%
1.26%
1.01%
0.76%
0.50%
0.00%
5.00%
10.00% 15.00% 20.00% 25.00%
Fig. 2 Involvement in pre-radicalization criminal behaviors among U.S. extremists. (Note: Arson
can be classified as either a violent or non-violent crime depending on whether the intention of the
act was to kill or injure)
Aggravated assault was the most common crime type for those in the PIRUS data
who engaged in criminal acts prior to radicalizing. Nearly 23% of extremists with
criminal histories in PIRUS committed at least one aggravated assault before radicalizing. Aggravated assaults were more common in the criminal histories of violent
extremists, with nearly 27% engaging in this crime versus 14% for non-violent
extremists. The rates of aggravated assault were similar across the ideological
groups in PIRUS. Just over 22% of Islamists, 25% of far-right extremists, and 27%
of far-left extremists with criminal histories committed at least one aggravated
assault prior to radicalizing.
Of the extremists in the PIRUS data who had a history of violent crime prior to
radicalizing, 12.7% committed acts of domestic violence (although this may be a
conservative estimate given that instances of domestic violence may not be reported
or may appear in sentencing records only as assault and/or battery charges). Other
violent crimes found in the backgrounds of the individuals in PIRUS include simple
assault (15.1%), robbery (14.1%), homicide (5.2%), and sexual assault (2.5%).
Of the violent extremists in PIRUS with criminal histories, 44.3% limited their
criminal activities to non-violent offenses. The most common non-violent crime in
the backgrounds of the individuals in PIRUS was the use, possession, or distribution
of illicit drugs. In fact, drug-related charges were the second most common pre-­
radicalization crime type for extremists in the PIRUS data with criminal histories.
More than 18% of the extremists in the data with criminal histories engaged in at
least one illegal act involving illicit drugs prior to radicalizing. Drug offenses were
relatively more common among violent extremists in the data: over 20% of violent
extremists with criminal histories had drug offenses on their criminal records compared to 13% for non-violent extremists.
The Link Between Prior Criminal Record and Violent Political Extremism in the United… 133
The individuals in PIRUS engaged in a number of other non-violent criminal
acts, including illegal firearms possession (20.4%), fraud (14.7%), theft (13.9%),
and driving under the influence of alcohol (9%). Larceny-theft was the single most
common pre-radicalization crime type for non-violent extremists in PIRUS. Nearly
15% of non-violent extremists in the database committed at least one known theft
prior to radicalizing. This outpaced other common crime types for non-violent
extremists, including aggravated assault (14%), drug offenses (13%), and simple
assault (12%).
The pre-radicalization criminal behaviors of a small percentage (14.1%) of the
extremists in PIRUS were tied to their involvement in street gangs or criminal organizations.7 Of the individuals with past ties to street gangs, approximately 80% went
on to engage in acts of violent extremism after radicalizing.
Taken together, the data on pre-radicalization crime patterns and offenses in
PIRUS suggest that political extremists rarely specialize in specific crime types. The
individuals that we examined who committed criminal offenses prior to radicalizing
engaged in a wide range of criminal acts, from less serious forms of delinquency,
such as theft and drug possession, to more serious forms of violent crime, including
assaults and homicides. Moreover, many individuals in the PIRUS data gradually
escalated in their criminal activities from non-violent offenses prior to radicalizing
to violent acts after adopting extremist beliefs. By contrast, some individuals, especially those affiliated with far-left groups, limited their extremist activities to non-­
violent crimes, even though many committed violent offenses prior to radicalizing.
Age of Crime Onset
In Fig. 3, we list the average age of earliest criminal activity for individuals with
criminal records for both violent and non-violent political extremists. The PIRUS
data show that, on average, U.S. extremists are well into adulthood when they first
engage in ideologically motivated acts. For example, violent extremists in PIRUS
were on average 33 years old when they first participated in illegal acts on behalf of
their extremist beliefs. However, the same individuals in PIRUS were often much
younger when they first engaged in non-ideological crime. In fact, 62.1% of the
extremists in PIRUS with criminal histories first engaged in non-ideological crimes
when they were 24 years old or younger. Most commonly, the extremists in PIRUS
first committed non-ideological crimes when they were between 18 and 24 years
old. Specifically, 44.6% of violent extremists and 43.9% of non-violent extremists
in PIRUS with criminal histories first engaged in criminal acts when they were
18–24 years old.
See Pyrooz et al. (2017) for a detailed study of the connections between gang involvement and
extremism in the PIRUS dataset.
7
134
M. A. Jensen et al.
44.64% 43.87%
22.92%
21.74%
18.75%
16.96%
9.82%
8.30%
9.82%
3.16%
Under 18 years old
18-24 years old
25-34 years old
Non-Violent Extremists
35-44 years old
45+ years old
Violent Extremists
Fig. 3 Average age of earliest non-ideological criminal activity
While less common, the rates of juvenile crime among the individuals in the
PIRUS data nonetheless reveal important differences in the backgrounds of violent
and non-violent extremists. Approximately 17% of the extremists in PIRUS with
pre-radicalization criminal histories first engaged in crime when they were under
the age of 18 years old. However, those who went on to commit acts of violent
extremism show significantly higher rates of juvenile offending. Nearly 22% of
violent extremists with criminal histories began engaging in criminal acts when they
were under the age of 18. In comparison, less than 10% of non-violent extremists
with criminal histories engaged in crime when they were juveniles.
Multivariate Analysis
To better assess the relationship between pre-radicalization crime and post-­
radicalization violence, we next performed a multivariate logit regression analysis
that estimates how the likelihood of violent extremism changes if individuals engage
in crime prior to radicalizing. Before moving on to the results of this analysis, we
first provide brief descriptions of the dependent, independent, and control variables
that are used in the model. We have already described the main dependent variable,
violent, coded “1” for individuals whose earliest public exposure involved an act of
violence or the intention to commit an act of violence, and “0” for individuals whose
earliest public exposure involved only non-violent acts.
Our main independent variable for this part of the analysis is prior criminal activity, which is coded “1” for participation in violent crime, “0.5” for participation in
non-violent crime, and “0” for no criminal participation prior to involvement in
extremist activities.
The Link Between Prior Criminal Record and Violent Political Extremism in the United… 135
Control Variables
For our multivariate analysis, we include a number of theoretically relevant control variables drawn from prior research. Stable employment is coded “1” for
individuals who worked regularly prior to engaging in acts of extremism and “0”
for individuals who were unemployed, alternated between periods of employment
and unemployment, or habitually changed careers in the years leading up to their
involvement in extremism. Education is an ordinal measure that captures the highest level of education attained by individuals at the time they engaged in illegal
acts. Individuals were coded “3” if they received a college degree or higher, “2” if
they attended college but did not graduate, “1” if they finished high school, or “0”
if they did not graduate from high school. Marital status is coded “1” for individuals with a legally-recognized spouse or domestic partner and “0” for divorced or
widowed individuals and those who never married. Individuals who were once
active in the military but were discharged before they engaged in extremism were
coded “1” for past military experience and “0” otherwise. Those on active military
duty at the time of their public exposure were coded “1” for active in military and
“0” otherwise.
We coded individuals who were part of close-knit, insular cliques with others
who shared similar extremist views as “1” for radical peers and “0” otherwise. We
coded individuals who had immediate or extended family members who participated in illegal non-violent or violent ideologically-motivated behavior as “1” for
radical family and “0” otherwise.
We coded mental illness as “1” if there is evidence that an individual suffered
from mental illness of any kind, including schizophrenia, bipolar disorder, post-­
traumatic stress disorder, or major depression and “0” otherwise. We coded mental
illness as positive based on either clinical diagnosis or self-reports and testimony by
family or friends.
To control for the possibility that individuals are more likely to engage in violence when they are members of competing groups, we coded rival groups as “1”
for individuals who were members of an extremist group that suffered from internal splintering or competed with like-minded organizations for status, prestige, or
resources and “0” otherwise. Evidence of internal competition included fractionalization within the group, acts or threats of violence between group members,
and leadership turnover due to disagreements about group behavior or goals. We
also coded this variable positively if there was evidence of violence between
rival groups.
To control for violence-justifying beliefs that may be present across the political
spectrum we included several ideology measures. These measures are binary variables that categorize individuals along far right, far left, radical Islamist, or single-­
issue ideological milieus (the categories are mutually exclusive). Gender is coded as
a dichotomy (“1” = men; “0” = women) and age is a continuous measure recorded
at the time at which the individual’s extremist activities first became public knowledge (e.g., they were arrested, their plot materialized).
136
M. A. Jensen et al.
Missing Data
Several methods exist for mitigating the problem of missing data in large datasets,
including simply excluding cases that have missing values from the analysis (i.e.,
list-wise deletion), replacing missing data with a universal baseline value (i.e.,
fixed-value imputation, or cold-deck imputation), or performing complex statistical
models for estimating missing values based off key extant data (see Safer-­
Lichtenstein et al. 2017).
Based on our previous work (Jensen et al. 2016, 2018; LaFree et al. 2018), we
relied on a regression-based multiple imputation technique to predict missing values. Regression-based multiple imputation operates on the assumption that data are
missing conditionally at random (Rubin 2004). Thus, while the missing information
for a given variable may not be randomly dispersed among all observations in a
study, it is reasonable to assume a certain degree of randomness to missing values
when accounting for other potentially confounding variables. We determined that
this is a safe supposition given the wealth of information contained in the PIRUS
dataset. Based off precedent in other terrorism research (Gruenewald and Pridemore
2012) and established practices in dealing with missing data in social science
research (Rubin 2004), we produced 50 imputed datasets using regression techniques and report the pooled values below.
Multivariate Results
Table 3 shows the results of the multivariate logistical analysis. A number of variables are significantly associated with violent or potentially violent extremist outcomes (as opposed to non-violent extremism). Perhaps most importantly, the results
indicate that pre-radicalization criminal activity, violent or non-violent, is the single
strongest predictor of post-radicalization violent extremism when controlling for
ideology.8 In fact, individuals who engaged in non-violent or violent crime prior to
radicalizing were 1.85 times more likely to engage in acts of violent extremism after
radicalizing than were extremists without criminal histories. The effect of pre-­
radicalization criminal behavior on post-radicalization violence are the strongest for
extremists whose criminal histories include acts of violent crime (e.g., homicide,
Given that the goal of this study is to isolate the effect of pre-radicalization crime on the propensity for post-radicalization violence, ideology is treated here as a control variable. However, it is
worth noting that ideological affiliation is the single strongest predictor of violent outcomes in
PIRUS. Individuals associated with far-right and Islamist groups are substantially more likely to
participate in acts of violent extremism than are individuals on the extremist far-left. This result is
not surprising. Groups on the extremist far-right and those affiliated with Salafi jihadism actively
encourage their followers to conduct acts of violence on behalf of their respective movements,
while many far-left extremist groups promote the use of non-violent political resistance to achieve
their goals.
8
The Link Between Prior Criminal Record and Violent Political Extremism in the United… 137
Table 3 Multivariate logistic regression: criminal history (all) and participation in extremist
violence
Variable
Prior criminal activity
Stable employment history
Education
Married
Past military experience
Active in military
Radical peers membership
Radical family
Mental illness
Rival groups
Gender
Age
Age (squared)
Islamist ideology
Far right ideology
Far left ideology
Exposure 1950s
Exposure 1960s
Exposure 1970s
Exposure 1980s
Exposure 1990s
Exposure 2000s
Β
.618∗∗∗
−.450∗
−.006
−.302∗
.280
.212
.599∗∗∗
−.505∗
.521∗∗
−.024
.400∗
−.060∗
.001∗
1.064∗∗∗
.533∗∗
−1.023∗∗∗
.283
.171
.554∗
.353
−.300
−.681∗∗∗
SE
.187
.197
.106
.139
.206
.307
.150
.205
.203
.165
.198
.024
.000
.202
.169
.198
.576
.263
.224
.202
.182
.154
Odds ratio
1.855
.637
.994
.740
1.324
1.236
1.821
.604
1.684
.976
1.492
.942
1.001
2.897
1.704
.359
1.327
1.186
1.741
1.423
.741
.506
95% C.I. for odds ratio
Lower
Upper
1.284
2.681
0.424
0.958
0.796
1.241
0.562
0.974
0.883
1.983
0.677
2.255
1.349
2.458
0.401
0.909
1.131
2.507
0.699
1.363
1.012
2.200
0.899
0.986
1.000
1.001
1.950
4.302
1.224
2.372
0.244
0.529
0.429
4.104
0.709
1.985
1.122
2.702
0.957
2.115
0.519
1.058
0.375
0.684
DV = earliest public exposure in extremist activity involved intentional violence against a person
or persons (1), or earliest public exposure in extremist activity did not involve intentional violence
against a person or persons (0)
N = 1867
∗p ≤ .05; ∗∗p ≤ .01; ∗∗∗p ≤ .001 (two-tailed)
assault, forcible rape). Individuals with violent criminal histories were 2.44 times
more likely to engage in acts of violent extremism once they had radicalized.
We note in passing a number of control variables that were also significantly
linked to greater propensities for violence among the subjects in PIRUS.9 In addition to criminal history, individuals with a documented or suspected mental illness,
those who were members of extremist cliques, and men were all significantly more
likely to engage in acts of violent extremism. Conversely, individuals with stable
employment histories were nearly 35% less likely to engage in acts of violent
While not the focus of our analysis, it is worth noting that the presence of radical family members
appears to have a negative effect on the propensity of individuals to engage in violent extremism.
This counterintuitive finding appears to be driven by the large percentage (60%) of individuals on
the far-left who had radical family members and significant others at the time of their involvement
in extremist activities.
9
138
M. A. Jensen et al.
Table 4 Multivariate logistic regression: criminal history (juvenile) and participation in extremist
violence
Variable
Juvenile crime
Stable employment history
Education
Married
Past military experience
Active in military
Radical peers membership
Radical family
Mental illness
Rival groups
Gender
Age
Age (squared)
Islamist ideology
Far right ideology
Far left ideology
Exposure 1950s
Exposure 1960s
Exposure 1970s
Exposure 1980s
Exposure 1990s
Exposure 2000s
Β
.889∗∗
−.664∗
−.102
−.389∗
.292
.317
.471∗∗∗
−.444∗
.595∗∗
−.038
.410∗
−.051∗
.001∗
1.076∗∗∗
.526∗∗
−.959∗∗∗
.304
.037
.384
.265
−.444∗
−.764∗∗∗
SE
.356
.171
.089
.171
.208
.310
.146
.192
.202
.183
.195
.023
.000
.204
.174
.207
.578
.262
.222
.204
.183
.154
Odds ratio
2.433
.515
.903
.678
1.339
1.373
1.602
.642
1.814
.963
1.506
.951
1.001
2.933
1.692
.383
1.355
1.038
1.469
1.303
.642
.466
95% C.I. for odds ratio
Lower
Upper
1.205
4.911
0.353
0.749
0.757
1.076
0.483
0.949
0.891
2.010
0.747
2.522
1.203
2.134
0.438
0.938
1.219
2.696
0.670
1.383
1.028
2.206
0.907
0.995
1.000
1.001
1.965
4.377
1.202
2.381
0.255
0.575
0.436
4.207
0.621
1.734
0.951
2.267
0.874
1.942
0.448
0.918
0.344
0.629
DV = earliest public exposure in extremist activity involved intentional violence against a person
or persons (1), or earliest public exposure in extremist activity did not involve intentional violence
against a person or persons (0)
N = 397
∗p ≤ .05; ∗∗p ≤ .01; ∗∗∗p ≤ .001 (two-tailed)
extremism than individuals who were long-term unemployed. Extremists who were
older and married were also less likely to engage in acts of violent extremism. In
general, these results track very closely with our earlier work on the PIRUS data
(Jensen et al. 2018; LaFree et al. 2018).
We next considered whether juvenile offending is also predictive of post-­
radicalization violence. The results are shown in Table 4. In general, the results
indicate that juvenile offending is one of the strongest non-ideological predictors of
post-radicalization violence when controlling for other important correlates of
extremism. According to Table 4, when we reproduce the earlier multivariate analysis using juvenile crime as the measure of previous criminality, we find a significant
increase in the probability that an individual will engage in acts of violent e­ xtremism
after radicalizing. Indeed, when juvenile offending is used as the measure of previ-
The Link Between Prior Criminal Record and Violent Political Extremism in the United… 139
ous criminality in the multivariate model, the probability that an individual with a
criminal history prior to radicalizing will go on to engage in acts of violent extremism increases from 1.85 times more likely to 2.43 times more likely. As Table 4
shows, while several variables remain significantly related to a higher probability of
violent extremism, juvenile offending is the strongest non-ideological predictor of
post-radicalization violence among individuals in PIRUS. Importantly, the measure
of juvenile crime used in the model includes acts of violent and non-violent crime,
indicating that the link between early crime and violent extremism is not simply
limited to a continuation of violent deviant behavior in the individuals’ adult years.
Limitations
Before moving on to a discussion of the policy implications of these results, we
acknowledge several limitations in the present study. First, the variables included in
our study have varying rates of missing data, including some variables (e.g., employment history) that are missing values for more than 60% of the cases in
PIRUS. Missing data are a common feature of open source studies of political
extremism (Dugan and Distler 2016; Freilich et al. 2014; Safer-Lichtenstein et al.
2017). Important information may simply be unavailable in court documents and
open source media. In addition, it is likely that the cases with the least missing data
are those most prominently covered by news agencies. In the study of political
extremism, like the study of crime more generally, we face methodological trade-­
offs. While the limits of open source data in this area are clear, more traditional
methods like surveys and case studies also have corresponding weaknesses.
Nevertheless, considering the non-trivial amount of missing data in PIRUS, we caution that our results are best viewed as preliminary.
Second, while we argued above that contrasting violent and non-violent political
extremists has advantages, we are not able to distinguish those who radicalize to
commit illegal acts of political extremism from the general population. While such
a study would undoubtedly make significant contributions to political violence
research, it is simply not possible given current data limitations.
Third, while many theories of radicalization to violence (Borum 2011; Horgan
2008; McCauley and Moskalenko 2011; Neumann 2013) conceptualize it as the
culmination of multiple, dynamic pathways, our data do not allow us to measure
with precision the temporal ordering of the variables we include. Furthermore, the
data that we rely on do not allow us to address important debates in criminology
about the mechanisms that link individual causal factors to specific outcomes. While
not the focus of this study, we caution that our results do not reveal if individual
correlates are linked to violent extremism through selection effects, conjunctural
dynamics, or another type of causal process.
And finally, given that our sample is limited to U.S.-based extremists, we cannot
generalize our results to other countries or regions. While the theoretical ­perspectives
that we draw from are designed to be broad in explanatory scope, it could be that
140
M. A. Jensen et al.
variations in cultural, legal, and social norms will influence how well individual
criminological correlates explain violent extremism outside of the United States.
Future research should explore how well dominant criminological theories explain
violent extremism in other geographical contexts, especially those outside the West,
in order to better understand the benefits and limitations of applying criminological
theory to the study of extremism.
Discussion
Policy makers seeking to reduce the threat of violent extremism would benefit from
building on effective criminological policies used to make informed law enforcement decisions and to shape prevention and rehabilitation programs. To this end, our
results suggest several specific options. First, the results underscore the importance
of leveraging knowledge about an individual’s criminal record in prioritizing counterterrorism investigations. Specifically, the violent extremists in our sample were
more likely than the non-violent extremists to have a history of criminal behavior,
including both violent and non-violent offenses. It is important to note that while
our results cannot definitively dismiss the possibility that extremists specialize in
violent crimes throughout their criminal careers, preliminary evidence suggests that
extremists often progress from minor to more serious offending. If this finding is
confirmed in subsequent research, it provides useful information for identifying
individuals who are at risk of engaging in violent political extremism.
Second, our results are in line with a long criminological research tradition that
underscores the stigmatizing effects of prior criminal activity. Prior research shows
the cumulative disadvantage of a criminal history, including effects on perceived
worth (Evans et al. 2018; Gendreau et al. 1979; Luoma et al. 2007), ability to vote
(Burch 2011; Manza and Uggen 2008; Uggen and Manza 2002), others’ perceptions
(Braithwaite 1989; Matsueda 1992), job and housing prospects (Agan and Starr
2016; D’Alessio et al. 2015; Stoll and Bushway 2008), and subsequent physical and
mental health impediments (Freudenberg 2002; Schnittker and John 2007). Further,
there is evidence that stigmatization may be especially pertinent for terrorist perpetrators who are attempting to regain standing following their disengagement from
extremist activities (Jasko et al. 2016; Kruglanski et al. 2014). The results generally
support the utility of policies aimed at reducing the stigmatization of criminal histories and promoting reintegration into society. Moreover, this suggests that an added
benefit of effective rehabilitation programs for non-extremist offenders may be their
role in preventing future violent extremism.
Third, our study identified differences in the prevalence of prior criminal activity
when comparing individuals who ascribe to different extremist ideologies.
Specifically, individuals ascribing to a far-right ideology were more likely to have a
history of criminal activity, including violent crime. By contrast, far-left extremists
were far less likely to have a pre-radicalization criminal history. These findings
­suggest that ideology should be explicitly considered in studying the varied path-
The Link Between Prior Criminal Record and Violent Political Extremism in the United… 141
ways to radical extremism: there appear to be different risk factors for violent
extremism depending on an individual’s ideological milieu. Thus, our results suggest that criminal history is more salient for the far-right when compared to the
far-left or Islamist cases, a finding supported by related research on characteristics
of extremist perpetrators (Chermak and Gruenewald 2015; Gill et al. 2014).
Finally, our results show that violent extremists with a criminal history were
significantly more likely to have started their non-ideological offending at a younger
age than non-violent extremists. In other words, age of onset matters for entry into
violent extremism, as it does for important criminological outcomes, such as length
and severity of criminal careers. While we cannot identify specific causal mechanisms, our results show that early entry into crime is a risk factor for violent extremism. Intelligence practitioners would clearly do well to liaise with local law
enforcement and utilize existing criminal record databases to make informed risk
assessments. Perhaps more importantly, programs aimed at preventing violent
extremism in the United States stand to gain by partnering with existing criminal
justice programs that are in place to steer at-risk youth away from engaging in juvenile crime.
Conclusion
In general, criminologists have played a small but growing role in explaining the
etiology of violent political extremism. Our results suggest that criminological perspectives have a lot to offer to the study of political extremism and that they may
potentially provide answers to questions that have long puzzled terrorism scholars.
Indeed, political violence research has struggled to identify the risk factors that
explain why some individuals are willing to commit acts of violence on behalf of
their extremist belief system while others are not. The present study shows that
criminal record, which plays an especially important role in life course (Sampson
and Laub 1997), subcultural (Singer 1986) and labeling/conflict perspectives (Pager
2003), may be one important risk indicator that separates violent and non-violent
extremists. While the link between pre-radicalization criminality and post-­
radicalization violence appears to be robust, research gaps remain. We conclude
with a short discussion of the opportunities for future research.
First, while contrasting violent and non-violent political extremists among a
sample of ideologically committed individuals provides a useful comparison, future
studies should attempt to distinguish those who radicalize to commit illegal acts of
political extremism from the general population. Such a study would allow analysts
to make inferences about the specific mechanisms that link criminal history to radicalization for some individuals but not others. Second, while many theories of radicalization (Borum 2011; Horgan 2008; McCauley and Moskalenko 2011; Neumann
2013) conceptualize it as the culmination of multiple, dynamic pathways, the
empirical study of extremism more often treats the phenomenon as linear and ­simple
(for an exception, see Jensen, Atwell Seate, and James 2018). While we can estab-
142
M. A. Jensen et al.
lish that criminal activity often comes before radicalization, future studies would be
well served to examine the complex longitudinal nuances that are often present in
the radicalization pathways of extremists. This would include not only an assessment of the temporal proximity of previous crime to radicalization, but also how
previous criminal activity interacts with other criminological correlates to produce
unique pathways to extremist outcomes. Alternative types of data, such as panel or
time series, would be ideal to measure these types of temporal processes. And
finally, given that our sample is limited to U.S.-based extremists, future terrorism
studies could further estimate the robustness of the relationship between criminal
history and violent extremism by examining it in other countries or regions of
the world.
References
Agan, A. Y., & Starr, S. B. (2016). Ban the box, criminal records, and statistical discrimination: A
field experiment (SSRN Scholarly Paper No. ID 2795795). Rochester: Social Science Research
Network. Retrieved from https://papers.ssrn.com/abstract=2795795
Basra, R., & Neumann, P. R. (2016). Criminal pasts, terrorist futures: European jihadists and the
new crime-terror nexus. Perspectives on Terrorism, 10(6). Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/554.
Beber, B., & Blattman, C. (2013). The logic of child soldiering and coercion. International
Organization, 67(1), 65–104. https://doi.org/10.1017/S0020818312000409.
Blumstein, A., Farrington, D. P., & Moitra, S. (1985). Delinquency careers: Innocents, desisters,
and persisters. Crime and Justice, 6, 187–219.
Blumstein, A., Cohen, J., Roth, J. A., & Visher, C. A. (Eds.). (1986). Criminal careers and career
criminals (Vol. 2, 1st ed.). Washington, D.C: National Academies Press.
Blumstein, A., Cohen, J., & Farrington, D. P. (1988). Criminal career research: Its value for criminology. Criminology, 26(1), 1–35. https://doi.org/10.1111/j.1745-9125.1988.tb00829.x.
Borum, R. (2011). Radicalization into violent extremism I: A review of social science theories.
Journal of Strategic Security, 4(4), 7–36.
Braithwaite, J. (1989). Crime, shame and reintegration. New York: Cambridge University Press.
Brame, R., Bushway, S. D., Paternoster, R., & Turner, M. G. (2014). Demographic patterns of
cumulative arrest prevalence by ages 18 and 23. Crime and Delinquency, 60(3), 471–486.
https://doi.org/10.1177/0011128713514801.
Burch, T. (2011). Turnout and party registration among criminal offenders in the 2008 general election. Law & Society Review, 45(3), 699–730. https://doi.org/10.1111/j.1540-5893.2011.00448.x.
Chermak, S., & Gruenewald, J. A. (2015). Laying a foundation for the criminological examination
of right-wing, left-wing, and Al Qaeda-inspired extremism in the United States. Terrorism and
Political Violence, 27(1), 133–159. https://doi.org/10.1080/09546553.2014.975646.
Chermak, S. M., Freilich, J. D., Parkin, W. S., & Lynch, J. P. (2012). American terrorism and
extremist crime data sources and selectivity bias. Journal of Quantitative Criminology, 28(1),
191–218. https://doi.org/10.1007/s10940-011-9156-4.
Clark, D. (2017, August 18). How many U.S. adults have a criminal record? Retrieved January
7, 2019, from http://www.politifact.com/new-york/statements/2017/aug/18/andrew-cuomo/
yes-one-three-us-adults-have-criminal-record/
Clarke, R. V. G., & Newman, G. R. (2006). Outsmarting the terrorists. Westport: Praeger Security
International.
The Link Between Prior Criminal Record and Violent Political Extremism in the United… 143
Cottee, S. (2016, January 25). Reborn into terrorism. The Atlantic. Retrieved from http://www.
theatlantic.com/international/archive/2016/01/isis-criminals-converts/426822/
D’Alessio, S. J., Stolzenberg, L., & Flexon, J. L. (2015). The effect of Hawaii’s ban the box
law on repeat offending. American Journal of Criminal Justice, 40(2), 336–352. https://doi.
org/10.1007/s12103-014-9251-9.
Deane, G., Armstrong, D. P., & Felson, R. B. (2005). An examination of offense specialization using marginal logit models∗. Criminology, 43(4), 955–988. https://doi.
org/10.1111/j.1745-9125.2005.00030.x.
DeLisi, M., Neppl, T. K., Lohman, B. J., Vaughn, M. G., & Shook, J. J. (2013). Early starters:
Which type of criminal onset matters most for delinquent careers? Journal of Criminal Justice,
41(1), 12–17. https://doi.org/10.1016/j.jcrimjus.2012.10.002.
Dugan, L., & Distler, M. (2016). Measuring terrorism. In The handbook of the criminology of terrorism (pp. 189–205). New York: Wiley-Blackwell.
Evans, D. N., Pelletier, E., & Szkola, J. (2018). Education in prison and the self-stigma:
Empowerment continuum. Crime & Delinquency, 64(2), 255–280. https://doi.
org/10.1177/0011128717714973.
Farrington, D. P. (1992). Criminal career research in the United Kingdom. The British Journal of
Criminology, 32(4), 521–536. https://doi.org/10.1093/oxfordjournals.bjc.a048255.
Forst, B., Greene, J. R., & Lynch, J. P. (2011). Criminologists on terrorism and homeland security.
New York: Cambridge University Press.
Freudenberg, N. (2002). Adverse effects of US jail and prison policies on the health and well-­
being of women of color. American Journal of Public Health, 92(12), 1895–1899. https://doi.
org/10.2105/AJPH.92.12.1895.
Freilich, J., Chermak, S., Belli, R., Gruenwald, J., & Parkin, W. (2014). Introducing the extremist
crime database (ECDB). Terrorism and Political Violence, 26(2), 372–384.
Gendreau, P., Grant, B. A., & Leipciger, M. (1979). Self-esteem, incarceration and recidivism.
Criminal Justice and Behavior, 6(1), 67–75. https://doi.org/10.1177/009385487900600110.
Gendreau, P., Little, T., & Goggin, C. (1996). A meta-analysis of the predictors of adult offender recidivism: What works. Criminology, 34(4), 575–608. https://doi.org/10.1111/j.1745-9125.1996.
tb01220.x.
Gill, P., Horgan, J., & Deckert, P. (2014). Bombing alone: Tracing the motivations and antecedent
behaviors of lone-actor terrorists. Journal of Forensic Sciences, 59(2), 425–435. https://doi.
org/10.1111/1556-4029.12312.
Glueck, S., & Glueck, E. (1950). Unraveling Juvenile delinquency. Oxford, England:
Commonwealth Fund.
Gottfredson, M., & Hirschi, T. (1990). A general theory of crime (1st ed.). Stanford: Stanford
University Press.
Gruenewald, J., & Pridemore, W. A. (2012). A comparison of ideologically-motivated homicides
from the new extremist crime database and homicides from the supplementary homicide
reports using multiple imputation by chained equations to handle missing values. Journal of
Quantitative Criminology, 28, 141–162. https://doi.org/10.1007/s10940-011-9155-5.
Gruenewald, J., Chermak, S., & Freilich, J. D. (2013). Far-right lone wolf homicides in the United
States. Studies in Conflict & Terrorism, 36(12), 1005–1024. https://doi.org/10.1080/10576
10X.2013.842123.
Hingson, R. W., Heeren, T., & Winter, M. R. (2006). Age at drinking onset and alcohol dependence: Age at onset, duration, and severity. Archives of Pediatrics & Adolescent Medicine,
160(7), 739–746. https://doi.org/10.1001/archpedi.160.7.739.
Hoffman, P. B., & Beck, J. L. (1974). Parole decision-making: A salient factor score. Journal of
Criminal Justice, 2(3), 195–206. https://doi.org/10.1016/0047-2352(74)90031-2.
Hoffman, P. B., Stone-Meierhoefer, B., & Beck, J. L. (1978). Salient factor score and releasee
behavior: Three validation samples. Law and Human Behavior, 2(1), 47–62. https://doi.
org/10.1007/BF01047502.
144
M. A. Jensen et al.
Horgan, J. (2008). From profiles to pathways and roots to routes: Perspectives from psychology
on radicalization into terrorism. The Annals of the American Academy of Political and Social
Science, 618(1), 80–94. https://doi.org/10.1177/0002716208317539.
Hunter, R., & Heinke, D. (2011). Perspective: Radicalization of Islamist terrorists in the
Western World. Retrieved January 7, 2019, from https://leb.fbi.gov/articles/perspective/
perspective-radicalization-of-islamist-terrorists-in-the-western-world
Hutchinson, S., & O’malley, P. (2007). A crime–terror nexus? Thinking on some of the links
between terrorism and criminality. Studies in Conflict & Terrorism, 30(12), 1095–1107. https://
doi.org/10.1080/10576100701670870.
Jasko, K., LaFree, G., & Kruglanski, A. (2016). Quest for significance and violent extremism: The
case of domestic radicalization. Political Psychology., 38, 815–831. https://doi.org/10.1111/
pops.12376.
Jensen, M., James, P., LaFree, G., Atwell-Seate, A., Pisoiu, D., & Stevenson, J. (2016). Empirical
Assessment of Domestic Radicalization (EADR) (Final Report No. National Institute of Justice,
Award Number 2012-ZA-BX-0005). College Park: National Consortium for the Study of
Terrorism and Responses to Terrorism (START). Retrieved from https://www.ncjrs.gov/pdffiles1/nij/grants/250481.pdf
Jensen, M., James, P., & Safer-Lichtenstein, A. (2018). Pre-radicalization criminal activity of
United States extremists (Research Brief). College Park: The National Consortium for the
study of terrorism and responses to Terrorism. Retrieved from http://www.start.umd.edu/pubs/
START_PIRUS_PreRadCriminalActivityofUSExtremists_Jan2018.pdf
Jensen, M. A., Atwell Seate, A., & James, P. A. (2018). Radicalization to violence: A pathway
approach to studying extremism. Terrorism and Political Violence, 1–24.
Kaplow, J. B., & Widom, C. S. (2007). Age of onset of child maltreatment predicts long-term
mental health outcomes. Journal of Abnormal Psychology, 116(1), 176–187. https://doi.
org/10.1037/0021-843X.116.1.176.
Kempf, K. L. (1987). Specialization and the criminal career∗. Criminology, 25(2), 399–420.
https://doi.org/10.1111/j.1745-9125.1987.tb00803.x.
Krippendorf and Hayes. (2007). Answering the call for a standard reliability measure
for coding data. Communication Methods and Measures, 1(1), 77–89. https://doi.
org/10.1080/19312450709336664.
Kruglanski, A. W., Gelfand, M. J., Bélanger, J. J., Sheveland, A., Hetiarachchi, M., & Gunaratna, R.
(2014). The psychology of radicalization and deradicalization: How significance quest impacts
violent extremism. Political Psychology, 35, 69–93. https://doi.org/10.1111/pops.12163.
LaFree, G., & Dugan, L. (2015). How has criminology contributed to the study of terrorism since
9/11? In Terrorism and counterterrorism today (Vol. 20, pp. 1–23). London: Emerald Group
Publishing Ltd.
LaFree, G., & Freilich, J. D. (Eds.). (2017). The handbook of the criminology of terrorism. Wiley-Blackwell. Retrieved from https://www.wiley.com/en-us/
The+Handbook+of+the+Criminology+of+Terrorism-p-9781118923955
LaFree, G., Jensen, M. A., James, P. A., & Safer-Lichtenstein, A. (2018). Correlates of violent political extremism in the United States. Criminology, 56(2), 1–36. https://doi.
org/10.1111/1745-9125.12169.
Laub, J. H., & Sampson, R. J. (1993). Turning points in the life course: Why change matters to
the study of crime. Criminology, 31(3), 301–325. https://doi.org/10.1111/j.1745-9125.1993.
tb01132.x.
Loeber, R., & Le Blanc, M. (1990). Toward a developmental criminology. Crime and Justice, 12,
375–473. Retrieved from http://www.jstor.org/stable/1147443.
Luoma, J. B., Twohig, M. P., Waltz, T., Hayes, S. C., Roget, N., Padilla, M., & Fisher, G. (2007).
An investigation of stigma in individuals receiving treatment for substance abuse. Addictive
Behaviors, 32(7), 1331–1346. https://doi.org/10.1016/j.addbeh.2006.09.008.
The Link Between Prior Criminal Record and Violent Political Extremism in the United… 145
Lussier, P., Proulx, J., & Leblanc, M. (2005). Criminal propensity, deviant sexual interests and
criminal activity of sexual aggressors against women: A comparison of explanatory models∗.
Criminology, 43(1), 249–282. https://doi.org/10.1111/j.0011-1348.2005.00008.x.
Manza, J., & Uggen, C. (2008). Locked out: Felon disenfranchisement and American democracy
(1st ed.). New York: Oxford University Press.
Matsueda, R. L. (1992). Reflected appraisals, parental labeling, and delinquency: Specifying a
symbolic interactionist theory. American Journal of Sociology, 97(6), 1577–1611. https://doi.
org/10.1086/229940.
McCauley, C., & Moskalenko, S. (2011). Friction: How radicalization happens to them and us.
Oxford: Oxford University Press.
McGloin, J. M., Sullivan, C. J., Piquero, A. R., & Pratt, T. C. (2007). Local life circumstances and offending specialization/versatility: Comparing opportunity and propensity models. Journal of Research in Crime and Delinquency, 44(3), 321–346. https://doi.
org/10.1177/0022427807302664.
Monahan, J., & Skeem, J. L. (2015). Risk assessment in criminal sentencing. Virginia Public
Law and Legal Theory Research Paper, 53. Retrieved from https://papers.ssrn.com/sol3/papers.
cfm?abstract_id=2662082.
Neumann, P. R. (2013). The trouble with radicalization. International Affairs, 89(4), 873–893.
https://doi.org/10.1111/1468-2346.12049.
Pager, D. (2003). The mark of a criminal record. American Journal of Sociology, 108(5), 937–975.
https://doi.org/10.1086/374403.
Picarelli, J. T. (2006). The turbulent nexus of transnational organised crime and terrorism:
A theory of malevolent international relations. Global Crime, 7(1), 1–24. https://doi.
org/10.1080/17440570600650125.
Picarelli, J. T. (2012). Osama bin Corleone? Vito the jackal? Framing threat convergence through
an examination of transnational organized crime and international terrorism. Terrorism and
Political Violence, 24(2), 180–198. https://doi.org/10.1080/09546553.2011.648349.
Piquero, A. (2000). Frequency, specialization, and violence in offending careers. Journal of
Research in Crime and Delinquency, 37(4), 392–418. https://doi.org/10.1177/002242780003
7004003.
Piquero, A. R., Farrington, D. P., & Blumstein, A. (2003). The criminal career paradigm. In Crime
and justice: A review of research. Chicago: University Of Chicago Press.
Pyrooz, D., LaFree, G., Decker, S., & James, P. A. (2017). Cut from the same cloth? A comparative study of gang members and domestic extremists in the United States. Justice Quarterly, 1,
1–32. https://doi.org/10.1080/07418825.2017.1311357.
Robins, L. N., & Przybeck, T. R. (1985). Age of onset of drug use as a factor in drug and other
disorders. NIDA Res Mongr, 56, 178–192. https://doi.org/10.1111/j.1360-0443.2010.02902.x.
Rosen, D. M. (2005). Armies of the young: Child soldiers in war and terrorism. New Brunswick:
Rutgers University Press.
Rubin, D. B. (2004). Multiple imputation for nonresponse in surveys. Hoboken: Wiley-Interscience.
Safer-Lichtenstein, A., LaFree, G., & Loughran, T. A. (2017). Studying terrorism empirically:
What we know about what we don’t know. Journal of Contemporary Criminal Justice, 33(3),
273–291. https://doi.org/10.1177/1043986217697873.
Sampson, R. J., & Laub, J. H. (1997). A life-course theory of cumulative disadvantage and the
stability of delinquency. In Developmental theories of crime and delinquency (Advances in
Criminological Theory) (Vol. 7, pp. 133–161). New Brunswick: Transaction.
Sanderson, T. M. (2004). Transnational terror and organized crime: Blurring the lines. SAIS Review
of International Affairs, 24(1), 49–61. https://doi.org/10.1353/sais.2004.0020.
Schnittker, J., & John, A. (2007). Enduring stigma: The long-term effects of incarceration on health. Journal of Health and Social Behavior, 48(2), 115–130. https://doi.
org/10.1177/002214650704800202.
Shover, N. (1996). Great pretenders: Pursuits and careers of persistent thieves (1st ed.). Boulder:
Westview Press.
146
M. A. Jensen et al.
Singer, S. I. (1986). Victims of serious violence and their criminal behavior: Subcultural theory
and beyond. Violence and Victims, 1(1), 61–70. https://doi.org/10.1891/0886-6708.1.1.61.
Steffensmeier, D. J., & Ulmer, J. T. (2005). Confessions of a dying thief: Understanding criminal
careers and illegal Enterprise (1st ed.). New Brunswick: Aldine Transaction.
Stoll, M. A., & Bushway, S. D. (2008). The effect of criminal background checks on
hiring ex-offenders∗. Criminology & Public Policy, 7(3), 371–404. https://doi.
org/10.1111/j.1745-9133.2008.00516.x.
Sullivan, C. J., Mcgloin, J. M., Pratt, T. C., & Piquero, A. R. (2006). Rethinking the “norm” of
offender generality: Investigating specialization in the short-term. Criminology, 44(1), 199–
233. https://doi.org/10.1111/j.1745-9125.2006.00047.x.
Toros, H., & Mavelli, L. (2013). Terrorism, organised crime and the biopolitics of violence. Critical
Studies on Terrorism, 6(1), 73–91. https://doi.org/10.1080/17539153.2013.765701.
Uggen, C., & Manza, J. (2002). Democratic contraction? Political consequences of felon disenfranchisement in the United States. American Sociological Review, 67(6), 777–803. https://doi.
org/10.2307/3088970.
Wolfgang, M. E., Sellin, J. T., & Figlio, R. M. (1972). Delinquency in a birth cohort. Chicago:
University of Chicago Press.
Testing a Threat Model of Terrorism:
A Multi-method Study About
Socio-­Economic and Psychological
Influences on Terrorism Involvement
in the Netherlands
Vanja Ljujic, Inge Versteegt, Frank Weerman, Fabienne Thijs,
Jan-­Willem van Prooijen, Fatima el Bouk, and Steve van de Weijer
Introduction
In this chapter, we presents the results from a multi-method study in the Netherlands
into the role of socio-economic and psychological factors underlying terrorism
involvement. Building on theories and findings of previous researchers in the field,
we present a descriptive model of terrorism that categorizes distal and proximal
‘threat triggers’. In the quantitative part of the study, we analysed a combined data
set on suspects of terrorist offenses, a control sample of the general population and
a sample of general offenders. Terrorism suspects were more often lower educated,
unemployed, and previously involved in crime compared to persons from the general
V. Ljujic
Vrije Universiteit Amsterdam, Amsterdam, Netherlands
I. Versteegt
Utrecht University, Utrecht, Netherlands
F. Weerman (*)
Erasmus University Rotterdam, Rotterdam, Netherlands
NSCR (Netherlands Institute for the Study of Crime and Law Enforcement),
Amsterdam, Netherlands
e-mail: Fweerman@nscr.nl
F. Thijs · J.-W. van Prooijen
Vrije Universiteit Amsterdam & NSCR (Netherlands Institute for the Study of Crime
and Law Enforcement), Amsterdam, Netherlands
F. el Bouk
The Hague University of Applied Sciences, The Hague, Netherlands
S. van de Weijer
NSCR (Netherlands Institute for the Study of Crime and Law Enforcement),
Amsterdam, Netherlands
© Springer Nature Switzerland AG 2020
D. Weisburd et al. (eds.), Understanding Recruitment to Organized Crime
and Terrorism, https://doi.org/10.1007/978-3-030-36639-1_7
147
148
V. Ljujic et al.
population with the same gender and age. Relatively often, they had lost their job or
became imprisoned for another crime a year before they were charged with a terrorist offense. In the qualitative part of the study, we conducted interviews with four
detainees from terrorist units, eight detainees charged with traditional crimes (as
reference group), and 18 professional informants that had personal experience with
current and former detainees on terrorism and other offenses. The results of these
interviews suggest that among terrorist offenders, early family experiences, attachment problems, and mental health issues increase feelings of perceived threat,
which further justify violent narratives of belonging and significance.
In this chapter, we present the results from a multi-method study (part of the
PROTON collaborative project) that was aimed to investigate the role of socio-­
economic and psychological factors and processes leading to involvement in terrorism. With this contribution, we attempt to serve three main goals. First, we formulate
a ‘threat model of terrorism’ that incorporates major socio-economic, cultural and
psychological determinants of terrorism that have been proposed in the literature.
Second, we aim to present and summarize the most important findings of our two
studies and provide quantitative as well as qualitative new insights on terrorism
offenders in the Netherlands. Third, we aim to use the quantitative and qualitative
findings to evaluate the basic features of our threat model of terrorism, and to comparing terrorist suspects with the general population as well as suspects of regular
offenses.
Previous research in the Netherlands already highlighted the potential role of
individual and group level adversities and strains, relative deprivation, personal
characteristics and network dynamics (see for overviews e.g., Weggemans et al.
2014; Feddes et al. 2015; de Bie 2016). However, most of the existing research in
the Netherlands has been based on open sources, government data and/or qualitative
material retrieved from small and specific samples of respondents. There are still
important gaps in contemporary knowledge and insights on who are involved in terrorist offenses in the Netherlands and what has led them to become involved or
recruited. Only recently, studies began to employ quantitative data of larger samples
(Weenink 2015; de Bie 2016; Bergema and van San 2019). In these studies, the
majority of jihadists was found to be from the lower social strata, often failed to
acquire adequate vocational education, and was unemployed or working in unskilled
jobs (de Bie et al. 2015; Bergema and van San 2019). Previous studies also show,
however, that there is not one common characteristic for all radicalized individuals.
Researchers agree that the answer to why and how people become involved in terrorism should be sought in complex pathways towards terrorist engagement (see
also Borum 2011). Both attitudinal and behavioral aspects of terrorism are important, and influenced by a variety of proximal and distal factors, shaped by different
interpersonal and socio-cultural socializing agents, including family, peers, and religious leaders (Sageman 2004; Decker and Pyrooz 2011; Victoroff and
Kruglanski 2009).
In our contribution, we focus not only on the characteristics of those who become
involved in a terrorist ideology or network in comparison to the general population,
but also investigate differences and similarities to those who commit regular crimes.
Testing a Threat Model of Terrorism: A Multi-method Study About Socio-Economic…
149
In this way, we might better tease out what processes are specific for becoming
involved in terrorism, as opposed to the processes underlying more general involvement in developing criminal behavior.
Theoretically we will argue that the transition from radical thoughts to radical
actions occurs in conjunction with a psychological need to (restore) clarity and
positive self-image (significance) in face of perceived threat to one’s material and
immaterial wellbeing (building on Kruglanski et al. 2014). Building on past research
and literature, we will propose a descriptive threat model of terrorism that categorizes distal and proximal ‘threat triggers’ of terrorism – experiences of (perceived)
threat that sets in motion cognitive and emotional responses, and as a result of that,
increases involvement in extremism and radical action. This model combines psychological and criminological notions of perceived threat (Stephan and Stephan
2013; Schmid and Muldoon 2015); strain (Agnew 2014) and significance loss
(Kruglanski et al. 2014) to make an inventory of the factors associated to violence-­
permissive attitudes and violent action. The model also stresses the importance of
proximal triggers and personal experiences in terrorist engagement.
We will report the results of two complementary studies, one with a quantitative
approach and one with a qualitative approach. In the quantitative study, we combined and analyzed various existing data sets that were available for the complete
Dutch population of terrorism suspects since the introduction of the Crimes of
Terrorism Act in 2004. In the qualitative study (Study 2), we complemented the
quantitative analyses with an in-depth account of the motives, experiences and life
histories of persons involved in terrorist activities in the Netherlands. To achieve
this, we conducted interviews in prisons with suspects and convicts of terrorist
offenses. We conducted interviews with four detainees from terrorist units, as well
as eight detainees charged with traditional crimes (to provide a reference group),
and complemented this with interviews with 18 informants that had personal experience with current and former detainees that were incarcerated on the basis of the
Terrorist Crime Act.1
In a concluding section, we will summarize these findings and compare them to
our theoretical model to evaluate its validity.
The Socio-Political Context of the Study
According to Statistics Netherlands (2016), the Dutch ethnic majority covers 79.3%
of the total population. Most non-Western immigrants come from Turkey (2.4%),
Morocco (2.2%) and Suriname (2.1%). In terms of religious affiliation, 4.9% of
Dutch population is Muslim.2 For decades, constitutional freedom to religion and
Both quantitative and qualitative studies have been approved by the ethical board of the Faculty
of Law from the VU university in Amsterdam.
2
See: www.cbs.nl/nl-nl/publicatie/2016/51/de-religieuze-kaart-vannederland-2010-2015.
1
150
V. Ljujic et al.
multicultural policy has facilitated integration of immigrants into the Dutch society.
However, the pace of integration of immigrants in the socio-economic sphere has
lagged behind the juridical sphere (Shadid 1991). In particular, there is a considerable amount of housing and school segregation (that is, concentration of minorities
in certain neighborhoods and schools). Combined with increased political polarization, this facilitated a social distance between the host and Muslim population
(Veldhuis and Bakker 2009). Ethnic associations, growing presence of radical
imams from abroad, and experiences of discrimination and exclusion are further
obstacles for intergroup contact. Until 9/11 however Muslim extremism did not
pose an immanent threat to Dutch society.
After the assassination of Theo van Gogh in 2004, jihadi extremism was waning
for 7 years, to be revoked again in 2011 with the start of the Arab Spring (de Bie
2016).3 Political turbulences in the Middle East and, especially, the emergence of
Islamic State rekindled the emergence of jihadists’ networks in the Netherlands.
Since 2012, the risk of terrorism has been labelled as “substantial” by the Dutch
Security Service (Bergema and van San 2019). In recent years, around 250 people
from the Netherlands have travelled to Syria and Iraq to join Islamic State (ibid.).
These foreign fighters are regarded as a major security concern in the Netherlands
(Bakker and de Bont 2016; Wittendorp et al. 2017). After the military defeat of
Islamic State, some of the combat-trained jihadi travellers returned to the
Netherlands, increasing the perceived risk of terrorist attacks in the country.
In order to counter the security threats, the Netherlands amended several legislative measures to supplement the Crimes of Terrorism Act. In our study, we adopt the
Dutch legal definition of terrorism, which explicitly refers to criminal offences
‘committed with a terrorist intent’. According to Article 83a, terrorism entails a
wide range of activities aimed at serious intimidation of the population (or part of
it); the attempts to force the government or any organization to act or refrain from
acting, and the disruption of the political, economic or social structure of a country.
Several laws, such as The Code of Criminal Procedure and the Penal Code have
been amended to investigate and prosecute crimes with terrorist intent. A list of
these crimes has been widened to include various offences, such as recruitment for
jihad; membership in a terrorist organization; the preparation of (and conspiring to)
commit terrorist offence; spreading terrorist propaganda, and providing material
and logistic support to terrorist groups. In an attempt to minimize prison radicalization and recruitment, the Dutch Ministry of Justice established special prison units
for terrorism detainees.
The salience of terrorist threat (e.g. in media and political statements) adds its
share to intergroup anxiety and tensions along ethnic and religious lines (Andersen
and Mayerl 2018; Choma et al. 2015). PEW Research Centre (2016) found that 58%
of surveyed Dutch believe that Muslims support extremist groups like ISIS and 35%
In the aftermath of the Theo van Gogh murder, two prominent jihadi networks, known as the
Hofstad group and the Context group, have been dismantled by the security services.
3
Testing a Threat Model of Terrorism: A Multi-method Study About Socio-Economic…
151
reported overly negative attitudes towards Muslims.4 A survey from 20175 shows
that 67% of Dutch population views ISIS as a major threat to the society. According
to study by Statistics Netherlands (2017), 70% of Dutch citizens are worried about
a terrorist attack, and 40% believe there is a “good chance” it may happen in the
country.6 In addition to perceived threats to physical safety, recent polls indicate a
perceived threat to national culture and the existence of xenophobic feelings. It was
reported that 83% of the Dutch are concerned about Dutch norms and values, and
81% is concerned about immigration. Fifty percent of the respondents see non-­
Western migrants as a threat to their way of life, and almost one third of the Dutch
population reported to feel threatened by the large influx of refugees.7
Right-wing extremists exploit the threat of terrorism and negative stereotypes
against Muslims to pursue a discriminatory and – in some cases – violent
Islamophobia agenda. Since 2004, two thirds of Dutch mosques have received
threats or were vandalized by hate graffiti, smashed windows, dead pigs on their
doorsteps, or even arson. These incidents indicate that Muslims as a religious group
have been held accountable for terrorist attacks performed by militant extremists
(Vellenga 2018). Right-wing extremists suggest through social media and militant
public marches that it is time to defend “our way of life” violently against the rise
of Islam. At the same time, an increasing number of non-Western (Muslim) minorities feel more insecure and less at home in the Netherlands (cf. Visser-Vogel et al.
2018). According to the Social and Cultural Planning Bureau, more than 50%
Moroccan-Dutch and 40% Turkish-Dutch have accounted discrimination in different areas of life, particularly in the job market (Andriessen et al. 2014).
Additionally, there are also left-wing extremist networks active in the
Netherlands.8 They sometimes confront right-wing extremists in public and violent
anti-demonstrations. Left-wing extremist groups are less organized, and less known
for attacks on citizens but may also pose a threat to society, as manifested in the
murder of right-wing politician Pim Fortuyn by a left-wing extremist in 2002.
However, left-wing extremists have not been terrorism suspects since the Crimes of
Terrorism Act in 2004. Therefore, they are not part of our research population.
While only a small portion of Dutch Muslim gets involved in activities with terrorist intent, many (deprived) individuals from the general population may be susceptible to radical beliefs (Balen and van den Bos 2017; Verkuyten 2018). According
to the Dutch security agency, there are a few thousand sympathizers of jihadi ideology in the country, which is attributed to ongoing polarization among majority
Dutch citizens and their Muslim counterparts (AIVD 2016).9
http://www.pewglobal.org/2016/07/11/methodology-27/
http://www.pewglobal.org/2017/08/01/globally-people-point-to-isis-and-climate-changeas-leading-security-threats/
6
https://www.counterextremism.com/countries/netherlands
7
https://www.ipsos.com/en/global-trends-survey-2017
8
See Van Ham et al. (2018), https://www.wodc.nl/binaries/2867_Summary_tcm28-323558.pdf
9
See
https://www.aivd.nl/binaries/aivd_nl/documenten/jaarverslagen/2016/04/21/jaarverslagaivd-2015/jaarverslag-aivd-2015-definitieve-webversie.pdf.
4
5
152
V. Ljujic et al.
revious Insights on Socio-Economic Influences
P
and Psychological Processes Related to Terrorism Involvement
Literature on terrorism proposes a variety of historical, political, religious, economic, socio-economic and psychological drivers of terrorism (see e.g., Schmid
2004, 2011). Most studies postulate that terrorist involvement occurs in conjunction
with social disadvantage and certain psychological responses to deal with collective
and individual strains (cf. Agnew 2016; Kruglanski et al. 2014; Doosje et al. 2013).
Research in the Netherlands shows that marginalization and socio-economic
deprivation are relatively prevalent among Dutch jihadi extremists and foreign
fighters. Some disadvantageous neighborhoods have become a breeding ground for
suburban terrorists (cf. Ljujic et al. 2017). Several authors (e.g. de Bie 2016; de Poot
et al. 2011) argue that the interplay of unfavorable life circumstances and socio-­
cultural factors determines both recruitment into, and bonding within, extremist
groups. The majority of Jihadi travellers (65.5%) in the Dutch sample were friends
with fellow fighters, often from the same neighborhood, before travelling to Syria
(Bergema and van San 2019). Unemployment rates are relatively high among jihadi
fighters; moreover, many of them are from poor backgrounds, have relatively low
levels of education, and have dropped out of secondary or tertiary school (Feddes
et al. 2015; de Bie 2016; Bergema and van San 2019; Weenink 2015).
Psychological research suggests that disruptive life events may trigger extremist
behavior (violence) due to “significance loss,” promoting a perception of life as
meaningless (Kruglanski et al. 2014). In other words, the ultimate motivation for
individual involvement in terrorism lays in a personal motivation of “significance
quest” (the search for esteem, achievement, meaning, competence, and control)
against the background of disturbing and threatening life events (cf. Kruglanski
et al. 2017). Empirical terrorism studies distinguished several ‘significance loss’
triggers for radicalization, such as the death of a loved one, failure at work or in
education, and contacts with the justice system (Feddes, Nickolson and Doosje
2015). These disruptive events may have provided a ‘cognitive opening’ for alternative life goals in the form of radical beliefs and extremist violence.
The social milieu from which terrorists are recruited is constantly changing in
line with different needs and goals of terrorist groups (Gallagher 2014). Basra
and Neumann (2016) have shown that ISIS-related radicals are typically recruited
among suburban criminal networks. Likewise, several Dutch terrorism suspects
and foreign fighters have been involved in various violent and property crimes
prior to radicalization (de Bie 2016; Ljujic et al. 2017; Basra and Neumann 2016).
This confirms the so-called crime-terror nexus described in previous literature
(Hutchinson and O’malley 2007; Makarenko 2012, see also Ljujic et al. 2017).
Several processes are suggested to explain this nexus (Basra and Neumann 2016).
Terrorist networks may turn to criminal organizations for instrumental reasons.
But offenders can also be actively recruited to become terrorists, as a way to be
redeemed by God from previous criminal acts and sins (Basra and Neumann
2016). It is also possible that both criminal and terrorist involvement are ways to
Testing a Threat Model of Terrorism: A Multi-method Study About Socio-Economic…
153
cope with the adversities of socio-economic deprivation and adversity; as a ‘suburban response to strains’ (McCauley and Moskalenko 2008).
Next to socio-economic and personal deprivation and strains, perceived threats
to one’s culture, status and physical wellbeing is mentioned as one of the most
important influences on radicalization and terrorism (cf. Huddy et al. 2007; Koomen
and van der Pligt 2009). Perceived threat does not always reflect real harm, but
rather the anticipation thereof (Stephan and Stephan 2005). For example, people
who have a lower socio-economic status or belong to a devalued minority group
typically associate higher status with hostility, repression and domination (Glick
2002), whereas people who occupy a higher status may associate lower and devalued status with (undesirable distribution of) social benefits, immoral behavior and
criminality (Fiske et al. 2002). Relationships between perceived threat and group
violence are also well documented (e.g. Ranstorp 1996; Kakar 1996), including terrorism (cf. Koomen and van der Pligt 2009). Even a symbolic (nonmaterial) threat
may determine how people think, feel and behave towards others (Feldman and
Stenner 1997; Brewer 1999; Riek et al. 2006, for meta-analyses). In the past decade,
ridiculing religious symbols and cultural values (Dutch film Fitna; Mohammed cartoons; Charlie Hebdo) have led to public outrage, death threats, even terrorist attack
against satirical journalists.
Several theories provide explanations for the decisive role of perceived threat in
modern society. According to evolutionary psychologists, being perceptive of threat
is part of a human survival mechanism (cf. Buss 2015). Fears and phobias towards
‘others’ resemble instinctive reactions to threats to survival in an ancestral environment (e.g., snakes, predators, diseases) (Bracha 2004; Neuberg and Cottrell 2006;
Schmitt and Pilcher 2004). This evolutionary ‘threat management system’ enables
people to quickly recognize threatening stimuli in their environment, including
pathogens (i.e., the disease avoidance system) and threats to one’s physical integrity
(Neuberg et al. 2011). Such physical threats include hostile coalitions or outgroups.
Indeed, Bowles (2009) illuminated that intergroup conflict and warfare significantly
shaped the process of natural selection among ancestral humans. This facilitated not
only within-group cooperation but also psychological adaptations to compete for
scarce resources (e.g. water, food, housing) and maintain group characteristics that
promote bonding and group cohesion (e.g. rituals, language, culture).
Social psychologists argue that group categorization evokes the salience of group
labels through discursive reinforcement of old-established fears and dislikes (Cuddy
et al. 2011). Such stereotypical evaluations of ‘outsiders’ reflect different types of
(perceived) threats and correspond to different levels of hostility towards different
(religious, ethnic, national) groups. Historically, perceived threat has captured stereotypical dangers from ‘others’ that were predominantly defined in the line with
perceived biological or physical differences (e.g. racism). According to the classical
theory of intergroup conflict (Tajfel and Turner 1979), people exaggerate similarities within groups (in-group cohesion) and differences between groups (Li and
Brewer 2004). Unsurprisingly, such polarization coincides with the emergence or
invigoration of fear and aggression towards ‘threatening’ outgroups (Brewer and
Campbell 1976).
154
V. Ljujic et al.
A Threat Model of Terrorism
All in all, we propose that perceived group threat, associated with relative deprivation, socio-economic hardship and personal uncertainty, increase susceptibility to
extremist viewpoints and ultimately, involvement in terrorist activities (Doosje et al.
2016; Kruglanski et al. 2014; Feddes et al. 2015; Agnew 2016; Brewer 1999).
Our model (presented in Fig. 1) postulates that perceived threat originates from
different distal and proximal sources. Sometimes, the source of threat involves factors which are far beyond the personal zone of influence. For example, people perceive distal global affairs (perceived Western dominance in geopolitical distribution
of power and wealth), and international events (military interventions against Iraq,
Syrian war, Gaza conflicts, etc.) as unjust, threatening and harmful. These distal
threats may lead to feelings of solidarity, empathy, but also anger, frustration and
grievances along lines of affiliation, such as ethnic and religious backgrounds.
We also propose discrimination and segregation as a source of threat. Consistent
to Sageman’s (2008) emergent model of terrorist involvement, we argue that resentments associated to devalued group status resonate with extremism as a device to
regain positive group identity. It involves uncritical acceptance of in-group’s rules
and values; and a willingness to defend the group ‘in threatening situations’
(Moghaddam 2005). Perceived threat also contributes to a process of dehumanization of outgroup members, and the rejection of mainstream norms and laws (van
Prooijen et al. 2015; Zick et al. 2008).
We expect that perceived threat associated to one’s personal zone (disruptive and
traumatic experiences and individual strains and adversities) plays a crucial role in
the step towards terrorist engagement. As previously mentioned, a person does not
need to encounter an imminent threat to life to feel genuinely threatened. A threat to
one’s status may have the same profound effects, because it threatens a deep-rooted
desire to matter, to be significant. According to Kruglanski et al. (2014, 2017), such
Threat triggers
Cognitive and
emotional response
Grievances,
conformational bias
Behavioral response
Distal
international
factors
Military
interventions,
ethnic conflicts
abroad
Distal
national
factors
Discrimination,
relative
deprivation,
segregation
Resentment, ‘ingroup love and
outgroup hate’
Separation from
mainstream society,
breaking rules, criminality
Proximal
personal
factors
Socio-economic
status, disruptive
experiences
Loss of significance,
violence permissive
attitudes
Crimes with terrorist intent
Fig. 1 Threat model of terrorism
Seeking contact with likeminded persons, political
activism, humanitarian
work
Testing a Threat Model of Terrorism: A Multi-method Study About Socio-Economic…
155
threats may lead to action when someone gets into contact with persons or means
(i.e. violence) to combat the source of threat (see also Doosje et al. 2013; King and
Taylor 2011; Klausen 2015). In extreme cases of suicide terrorism, perceived threats
are so immanent that they require an ultimate sacrifice in order to achieve significance again (de Graaf 2017; cf. Versteegt et al. 2018).
Study 1: Socio-economic determinants of terrorism
In our quantitative study, we utilized two data sources. An anonymized database
from the Dutch prosecution office was used to identify all suspects who were
accused of ‘crimes with terrorist intent’ in the Netherlands (based on the Terrorist
Act 2004) between 2004 and April 2017. This comprises the complete population of
terrorism suspects since the introduction of the Crimes of Terrorism Act. This dataset could be combined with several anonymous datasets on general statistics from
Statistics Netherlands (CBS) to identify quantifiable and registered indicators of
factors related to terrorism involvement. The unique combination of these data
enabled us to acquire insight into the relationship between various demographics,
socio-economic indicators of adversity, previous crime involvement and being a
suspect of terrorist activities.
We did not receive the data directly. Instead, the identifiable data about terrorism
suspects (population database numbers) from the Dutch prosecution office were
sent directly to Statistics Netherlands, where the population database numbers were
removed so that the suspects were not identifiable. The data preparation and analyses were conducted via a protected server of Statistics Netherlands.
In total, the database from the Dutch prosecution office consisted of 353 suspects
of terrorist offenses. However, a substantial portion of these persons could not be
linked to the databases of Statistic Netherlands, because they were not registered in
the Personal Records Database (BRP).10 Individuals who are not registered are most
likely illegal immigrants or asylum-seekers whose applications have been rejected.11 They constituted 21.0% of the sample. For 279 suspects, we had sufficient
information about demographics, socio-economic position and their criminal past.
This ‘terrorist’ sample (n = 279) is the basis of our quantitative analysis.
We also constructed two control groups. For both the descriptive statistics as well
as logistic regression analyses, we created a control offender sample (n = 279) that
consisted of non-terrorism suspects of other offenses who are similar to terrorism
The database contains the personal data of people who (used to) live in Netherlands. Municipalities
record the personal data of all residents in the BRP. For information, see: https://www.government.
nl/topics/personal-data/personal-records-database-brp
11
Research on Dutch jihadi networks demonstrates the involvement of vulnerable immigrants in
the Netherlands (De Bie et al. 2014). For additional information on who is excluded from the BRP,
see the CBS-website: https://www.cbs.nl/nl-nl/achtergrond/2017/38/basisregistratie-personen
(this information is only available in Dutch).
10
156
V. Ljujic et al.
Table 1 Basic demographics of terrorism suspects
Factors
Sex
Age at time of terrorist offense
Category
Male
Female
17 or younger
18–25
26–35
36–45
46 or older
Terrorism suspects (n = 279)
%
#
87.5
244
12.5
35
7.9
22
32.6
91
30.5
85
19.7
55
9.3
26
suspects along the demographics of age and gender.12 Also a general control sample
(n = 6000) of citizens from the general population was selected, again similar with
regard to age and gender.
The datasets from Statistic Netherlands gave us access to the necessary data.
However, most of the datasets, which we combined with the dataset from the Dutch
prosecution office, did not offer information on the complete time span (2003–2016)
that we focused on. Therefore, the tables below show different sample sizes for different variables. It also appeared that there was a lot of missing data on education in
general. For this reason, we chose to exclude the education variable from the logistic regression analyses.
Finally, for the dynamic variables that may change over time (e.g., work situation,
level of education, suspected of other crimes, et cetera) we used data from the year
before the suspicion.13 This way we ensured that potential relations we find cannot
be interpreted as effects of being a terrorism suspect instead of a potential cause.
In Table 1, we present some general demographic descriptives for the total group
of 279 suspects of terrorist offenses for which we had sufficient information. Males
dominate within the terrorism suspect population (87.5%). The mean age is 30
(median: 27) during the time of suspicion and the majority of the population is
between 18 and 35 years of age (62.6%).
In Table 2, we describe the characteristics of our sample of terrorism suspects
together with our two control samples of general suspects and the general population. We present information about origin, level of education, whether they were
officially employed or not, and previous involvement in general offending.
The table shows that suspects of terrorist activities have a migrant background
more often than general suspects and the general population (81.3% versus 48.4%
and 33.2%). This may be the result of the recent wave of jihadi terrorist activities but
also reflects the political and police attention that is devoted to this type of terrorism
at the moment. Further, suspects of terrorist offenses seem slightly less often
­officially employed (44.0% versus 50.9% and 58.7%), and they more often lost their
For age, we made age categories and matched the age groups of the terrorism suspects with the
control groups.
13
For the dynamic variables of the control groups (which were based on 2016 information), we
used data from the year 2015.
12
Testing a Threat Model of Terrorism: A Multi-method Study About Socio-Economic…
157
Table 2 Origin, SES and criminality of terrorism suspects, general suspects and population
Factors
Origin
Category
Non-­
immigrant
First
generation
Second
generation
Terrorism
suspects
(n = 279)
%
#
18.6
52
General
suspects
(n = 279)
%
#
51.6 144
General
population
(n = 6000)
%
#
66.8 4010
41.2
115
21.9 61
19.7 1181
40.1
112
26.5 74
13.5 809
(n = 170)
106
57
7
(n = 250)
110
140
(n = 250)
32
12
206
(n = 224)
(n = 4235)
67.4 151
45.2 1915
28.1 63
36.9 1563
4.5 10
17.9 757
Highest level of education
Lower
Middle
Higher
62.4
33.5
4.1
Yes
No
44.0
56.0
Employmenta
Job loss?
(A year before the
suspicion compared to
2 years before the
suspicion)
Suspected of offense(s)
Job loss
11.5
Found a job 4.3
No change 84.2
Yes
No
29.2
70.8
Yes
No
9.9
90.1
Detention
50.9 142
49.1 137
58.7 3519
41.3 2481
6.1 17
9.0 25
84.9 237
3.5 208
6.5 389
90.1 5403
(n = 233)
68
29.4 82
165
70.6 197
(n = 233)
23
7.2 20
210
92.8 259
2.4 146
97.6 5854
0.5 31
99.5 5969
The employment variable exists of data on whether or not a person had a job in a specific year.
Those without a job can be unemployed on a voluntary or involuntary basis. Therefore, besides
being unemployed, those who fall within the category ‘No’ could also be students (and have no
need for a (official) job), live from social benefits, or have unofficial jobs
a
job in the year before the suspicion (11.5% versus 6.1% and 3.5%). Later in the
analyses we will scrutinize whether these differences also point to significant and
independent effects of employment variables. Education levels of terrorist and general suspects are quite similar; in both groups, lower education makes up (almost)
two third of the group. Within the general population, less than half of the sample
falls within the lower education category. A substantial portion of the terrorism
suspects, almost 30%, was involved in general types of offending before they
became suspected of terrorist offenses. This is similar to the general suspects, but
highly different from the general population of which almost none were suspected
of offenses (2.4%). Finally, only a minority has spent time in detention 1 year before
becoming a terrorism suspect (9.9%). However, this is comparable to the general
158
V. Ljujic et al.
Table 3 Associations between being a terrorism suspect and origin, employment and previous
offending variables
Factors
Origin
Non-immigrant
First generation
immigrant
Second generation
immigrant
Employment
Job loss
Found job
Suspected of criminal
offenses
Detention
∗
Correlation coefficient Phi
Terrorism suspect vs. general
population
Terrorism suspect vs. general
offenders
−0.208∗∗∗
0.110∗∗∗
−0.345∗∗∗
0.208∗∗∗
0.155∗∗∗
−0.058∗∗∗
0.086∗∗∗
−0.018
0.273∗∗∗
0.191∗∗∗
0.144∗∗
−0.069
0.095∗
−0.094∗
−0.002
0.049
p < .05. ∗∗p < .01. ∗∗∗p < .001
suspects (7.2%), and much higher than in the general population, were we find that
almost no one in the sample (0.5%) was detained before.
In the next analysis, we investigated to which extent the variables from Table 2
had an independent and significant relationship with being a suspect of terrorism.14
We included 204 terrorism suspects in this analysis for whom we had sufficient
information.15
Table 3 gives an overview of the correlations between different factors and being
suspected of a terrorist offense. In the comparison with the general population, we
mostly find values between 0.1 (small) and 0.3 (medium) and all of the correlations
are significant. We observe a modest positive relation between being a terrorism
suspect and having a 1st and 2nd generation immigrant background, being suspected
of criminal offenses, and having been in detention. For non-immigrant background
we find a negative correlation and for employment (having a job) a very small negative one. The comparison with general offenders, on the other hand, demonstrates
that solely origin is significantly correlated with being a terrorism suspect instead of
suspects of general types of crime. Here, the other variables are very weakly and
non-significant associated with being a terrorism suspect instead of a general suspect.
Table 4 present the results from two logistic regression models that give us
insight in what characteristics/factors are independently associated with an
increased likelihood of becoming a terrorism suspect. In regression Model I, terrorism ­suspects compared to the general population, most of the effects are signifiAs explained before, the education data was excluded from the logistic regression analyses due
to the structural missings.
15
For some terrorism suspects, we had missing data on a range of variables. Therefore, we excluded
them from the analyses.
14
Testing a Threat Model of Terrorism: A Multi-method Study About Socio-Economic…
159
Table 4 Summary of logistic regression analyses for variables predicting being a terrorism suspect
Variable
Origin
Non-immigrant
1st generation
immigrant
2nd generation
immigrant
Job loss (trigger)
Found job
(trigger)
No official
employment
Suspected of
criminal offenses
Detention
N
Model fit
Model I: Terrorism suspect vs. general Model II: Terrorism suspect vs.
population
general suspects
Adj.
Adj.
odds
odds
ratio 95% CI OR
ratio 95% CI OR B (SE)
B (SE)
(ref.)
1.795 (.195)∗∗∗ 6.02
[4.11, 8.82]
(ref.)
1.417 (.243)∗∗∗ 4.13 [2.56, 6.64]
1.891 (.203)∗∗∗ 6.62
[4.45, 9.86]
1.157 (.239)∗∗∗ 3.18 [1.99, 5.08]
1.195 (.255)∗∗∗ 3.30
−.731 (.380)
.48
[2.01, 5.44]
[.23, 1.01]
.507 (.356)
−.657 (.435)
1.66 [.83, 3.33]
.52 [.22, 1.22]
.143 (.216)
1.15 [.76, 1.76]
2.413 (.203)∗∗∗ 11.17 [7.50, 16.62] −.067 (.225)
1.236 (.362)∗∗ 3.441 [1.69, 7.00]
6204
R2 = .228 (Nagelkerke)
Hosmer and Lemeshow test: .455
.94
[.60, 1.45]
.343 (.356)
1.41 [.70, 2.83]
558
R2 = .144 (Nagelkerke)
Hosmer and Lemeshow test: .283
∗
p < .05. ∗∗p < .01. ∗∗∗p < .001
cant.16 People with an immigrant background have a higher probability of becoming
a terrorism suspect than others in the population. Also losing a job in the previous
year predicts an increased likelihood of becoming a terrorism suspect. Interestingly,
the opposite situation of finding a job does not have an effect. Also previously being
suspected of other criminal offenses is related to an increased likelihood of becoming a terrorism suspect, and the effect is relatively strong (estimated odds ratio of
more than 11). Finally, being in detention in the year before is also positively related
to an increased likelihood of becoming a terrorism suspect.
Model II, terrorism suspects compared to general suspects, shows that none of
the effects related to work situation or criminality are significantly related to the
distinction between being a terrorism suspect and a general suspect. Solely origin,
having an immigrant background compared to not having an immigrant background,
predicts an increased likelihood of becoming a terrorism suspect instead of a general suspect. In line with the descriptive data, this confirms that terrorism suspects
and general suspects are similar on most of the characteristics discussed.
Inclusion of the variable unemployment in Model I resulted in a significant Hosmer en Lemeshow
test, which is an indication that the model is not a good fit. Therefore, we ran Model I without this
variable.
16
160
V. Ljujic et al.
In sum, origin (1st and 2nd generation immigrant), job loss, being suspected of
other offenses and detention can be seen as risk factors in getting involved in terrorist crimes. However, terrorism suspects do not significantly differ from general suspects on SES characteristics and criminal history.
tudy 2: Qualitative Analysis of Perceived Threat
S
and Individual Involvement in Terrorism
In our qualitative Study 2 (for an extensive report, see Versteegt et al. 2018), we
interviewed 30 people to capture the life events, socio-economic backgrounds and
involvement mechanisms of people who were detained as a suspect of terrorist
offenses. We conducted our study in the two prisons in The Netherlands that have a
so-called terrorist unit.
We were able to recruit four inmates in the terrorism units, which we interviewed
extensively. To contextualize our findings about the terrorism suspects, we interviewed eight inmates of other units of the prison. Because the participation among
the detainees of the terrorist unit was low, we also interviewed 18 persons that were
working in or around the terrorist units and had in-depth knowledge about current
and former detainees that were suspected of terrorist offenses. These ‘informants’
included prison wardens and mentors, spiritual caretakers and psychologists at the
prison, which ensured a variety of perspectives. We also conducted a focus-group
interview with informants inside the prison.
We used a semi-structured questionnaire to assess the background, socialization
and previous development of the detainees, as well as their ideology and experiences with socio-economic and personal setbacks and adversities. Additionally, we
employed a calendar instrument, adapted from a version that was developed in a
previous study on the lives of incarcerated women (Joosen and Slotboom 2015).
With this instrument, detainees could indicate the socio-economic situation and
events in their personal life during the last year prior to their offense. We also asked
the informants to complete a life event calendar for one particular detainee that they
had sufficient information on. Through various open questions, we looked for signals of socio-economic and personal adversities, we investigated their psychosocial
wellbeing and mental health, and asked about their religious and ideological attitudes. We also asked details about their family background, childhood experiences
and socialization.
The use of informants may seem limited because they can have instrumental
reasons to express particular views about the inmates of the terrorist units. However,
we have taken several measures to increase and evaluate the reliability of the informant reports. In order to prevent a biased response from only prison workers, we
interviewed lawyers as well, and people working for the probation office – both
professionals with their own point of view, and not employed by the prison.
Informants from these different groups were generally in agreement about the ter-
Testing a Threat Model of Terrorism: A Multi-method Study About Socio-Economic…
161
rorism suspects. Further, it turned out that two of the calendars taken from informants referred to an individual who were also in our sample as a respondent. This
enabled us to compare the information in the life histories from two sources, and
these appeared to be remarkably consistent. Therefore, we do not believe that the
responses from the informants are systematically biased. Workers in the prison did
express criticism of the prison system and specific legal procedures associated with
the terrorist unit though, but we collected these statements anonymously in a separate document for the prison director and left this out of the analysis.
To guarantee anonymity, we are very careful in how we present our data. As the
terrorist units house less than 30 prisoners in total, and the professionals working
with them are limited in number as well, we present the quotes without specific
reference to age, gender or profession. In our presentation of the interview quotes,
the inmates are referred to as “detainees”. The various people with professional
personal contact with the terrorist suspects are referred to as “informants”.
We provided all the respondents with a distinguishing code for their category,
and a number for each individual. These are the codes that we used to present
the quotes:
A: terrorist suspects
B: suspects of regular criminal offences (the control group)
C: professionals working inside the prison
D: professionals working outside the prison
Our findings partly confirm the quantitative findings, but also nuance these and add
some other elements that may be important to understand why and how people
become involved in terrorism.
With regard to education, there appeared to be a difference between detainees
from the terrorist units that were regarded as ‘leaders’ and detainees that were seen
as merely ‘followers’. The followers had a relatively low level of education, while
the average educational level of the leaders was higher than that of the followers and
also the regular detainees. However, the informants reported that in many cases,
their acquired status and their economic situation did not match their educational
level and their capacities. This difference between expectations and real outcomes
may have contributed to feelings of significance loss in this group, leaving them
with cognitive dissonance about the contrast between their intellectual abilities and
their experienced opportunities in society. These experiences may have made them
susceptible to an extremist ideology.
Informant D10, working outside the prison, states: “One person had a very high education
and he literally said: so they keep rejecting me because of my ethnic background, I probably
don’t belong. Let me find a place where I do belong and where they do respect me.”
Similarly, informant C13, working in the prison, notes:
They (the whole group, IV) are rather well educated; they are not doing so badly. There are
many people in a similar situation, who do not radicalize. (Later): In their educational situation, they are not the needy. Very often, they have a better than average intelligence and
they have read many books, too.
162
V. Ljujic et al.
With regard to employment, the interviews provide additional information to the
quantitative study that could not distinguish between jobless people, students, and
under aged persons. . In our qualitative study, we found that previous employment
through jobs and independent companies is not uncommon among the interviewed
suspects at the terrorism unit, while long term unemployment was more common in
the group of regular detainees that we interviewed (4 of 8 cases). The informants
confirmed that unemployment was not the rule for terrorist suspects.
Interviewer: Did they have jobs?
Informant C3: Definitely.
I: More than at the regular prison?
C3: Oh yes, much more.
The jobs of the terrorism suspects varied from simple technical jobs at a low wage,
to management jobs. The general impression of the informants was that suspects at
the terrorist units had better jobs than the regular detainees. However, in several
cases, terrorist suspects had lost their job a few years prior to their crime. This was
reported by three of the four respondents in the terrorism unit. Two of our respondents explained how they had become obsolete in a company that they had worked
in for a longer period of time. This is what a detainee (A14) at the terrorist unit told
us about employment:
At the moment of the terrorist offense, “I was unemployed. I had been fired after a large
reorganization in a company where I had worked over 10 years, and where I had enjoyed
working. After losing his job, I unsuccessfully applied for jobs.” The terrorist suspect added
that the strained job market made it difficult to find employment.
We found no indication, however, that the income situation was extremely stressful
for the terrorism unit inmates prior to their offence. Debts, receiving social benefits
and criminality were not mentioned more by the respondents and informants (even
slightly less) for the terrorist unit than by the respondents from the control group.
With regard to housing, detainees at the terrorist unit seemed to be less deprived
than regular detainees. One of our informants describes the general picture of the
terrorist unit group in terms of housing:
Informant inside the prison, C4: “Most of them lived with their parents or with a partner.”
A similar picture of relatively stable housing conditions emerged from a focus
group interview with informants working inside the prison:
Focus group informant: “In all those years in the terrorist unit, we had only five persons
who were homeless.”
Overall, there are no outspoken objective differences between the two research
groups (terrorist unit detainees and regular detainees). We did not find striking differences in socio-economic markers like education, jobs, and housing between terrorist and regular detainees – and there are indications that the terrorist unit detainees
may even be slightly “better off”.
Next to these socio-economic variables, psychosocial and mental health factors
may have contributed to the development of extremist thought (see Weenink 2015).
Testing a Threat Model of Terrorism: A Multi-method Study About Socio-Economic…
163
However,our informants did not agree on this topic. Some of them mentioned
ADHD, post-traumatic stress, autism and attachment issues for the detainees of terrorism units. According to some informants, PTST and attachment disorders may
have made detainees vulnerable to social failure and deprivation, but they may also
have made them more susceptible to group pressure. Some informants mentioned a
proneness to violence, possibly related to psychopathology and narcissism, for the
supposed leaders. One informant explained the difference in mental illnesses and
disorders between leaders and followers as follows:
Informant C2, working inside the prison: “There are leaders and followers. Besides the
difference in IQ, these people are also different in their personalities. The leaders are natural leaders, they are highly educated and could also have been leaders in some other organization. They tend to have these personality disorders like narcissism, bipolar disorder, or
anti-social disorders. The followers have a low education and are easily influenced. They
are very vulnerable, can have depressions and a low self-image”.
In terms of adverse experiences, terrorist unit and regular detainees also appear to
share many characteristics. Both groups report various experiences of discrimination, trauma, and personal setbacks. However, the terrorist detainees seem to perceive these experiences as more severe and as signs of social injustice, while the
regular detainees seemed to accept their problems as part of life and as something
they should cope with personally.
Informant C1, working in the prison: “I always wonder if they have experienced more
losses, I don’t think so. But they are triggered by these events to question life.”
Respondent A22: “If I had to describe them (his fellow inmates at the terrorist unit): they
are sensitive guys. They cannot deal with injustice. I can let go of things. They cannot.”
These findings left us wondering why adverse events created more significance
issues, and stronger feelings of relative deprivation in the inmates from the terrorist
units. We found three possible, interrelated characteristics of the terrorist group,
which may explain these differences in perception.
First, we have found indications that the early family life of the extremist group
was less stable – this notion is based more on the accounts of our informants than
on the stories of our respondents, who seemed to provide mainly social desirable
answers about their family life. The informants mentioned that divorce of parents
and dysfunctional, broken families are very common among the detainees of the
terrorist unit. According to some of our informants, such circumstances occurred in
more than 80% of the cases (expressed in a focus group interview in prison, as well
as estimated by one informant outside prison, D10). In many families, parents were
(said to be) unable to provide stability and unconditional love. Other factors that
were mentioned included culturally transferred patterns of strict or abusive parenting, or ‘spoiling’ and pedagogical-moral neglect. Such impoverished settings may
create trauma in young children – especially when their family stands out negatively
in a larger cultural community, and when criticism of parents is a cultural taboo.
An interview with an informant, working at the terrorist unit, illustrates this:
C4: “(….) There was more instability in the situation at home, which is my impression.”
I: “Can we speak of attachment disorders?”
164
V. Ljujic et al.
C4: “Absolutely. Whereas the image of mother, within the culture, remains intact. There is
a big discrepancy there. Parents must be talked about with a lot of respect. Mother is almost
a saint. ‘Paradise is at the feet of the mother’, that is how it is written in the Qur’an. But
this particular mother often neglected things, or refrained from doing things, or was unable
to do them.”
Another illustration from a focus interview with professionals working at the terrorist unit:
Focus group informant: “In at least 90 % [other person corrects this number] or definitely
80 %... we see broken families, a criminal past, drug issues, no relationship with the father.
In such a situation it may happen that you start seeing yourself as a loser. And then suddenly, someone shows up…. They did not finish their school, they never finished anything.
Very often, youth care has been involved. We have had someone here, he kept searching. He
had been an animal activist, he had been with the Lord, and now he ended up in radical
Islam. It was just never right, and he kept looking for something else. Looking for recognition, looking for brotherhood. To belong somewhere, because they failed, that’s how they
feel.”
Second, in interviews with detainees from the terrorist units as well as with the
informants we found indications that a search for meaning, identity and belonging
was strongly present in the lives of the terrorist unit detainees. They seemed, more
so than the control group, sensitive to a narrative that provides them with an identity,
a sense of belonging, and moral guidelines from authority figures they can love as
their surrogate family.
Informant inside the prison, C4: “There is a difference. These people really have brothers.
Normal detainees have friends that buy drugs from them. These people have a brotherhood,
which really feels very intense to them.
Informant inside the prison, C1: “I can imagine that this brotherhood really means a lot to
them. When you feel you have always been treated like an outcast actually…and suddenly
there is someone who…uses these ‘lover boy’- like methods…With all those hugs, too…”
I: “Hugs?”
R: “They keep embracing each other on every occasion”.
This search for belonging may be interpreted as a result of to the reported early life
instabilities. The (mental or physical) unavailability of a primary caretaker may
have generated attachment problems in children, and as young adults, this may have
left them with an anxiety-driven need to find social bonds. The narrative of ‘brotherhood’ in extremist organizations literally provides individuals with a stable and reliable family. Persons with attachment problems also often seek identification figures
to admire. We heard stories among our informants about celebrity worship syndromes of detainees in the terrorist units (towards Mohammed B., the killer of Theo
van Gogh, for example), and religious obsessions. Also the tendency of the terrorist
unit inmates to hug each other, and form strong social pacts, may be seen as indications that the need for social bonding in these individuals has pathological and
obsessive elements, which could stem from childhood trauma.
A third factor that set apart the detainees from the terrorism unit from the regular
detainees, were the coping strategies and narratives they used to deal with adversities. We found that regular detainees more often relied on religious coping strategies
Testing a Threat Model of Terrorism: A Multi-method Study About Socio-Economic…
165
to deal with experiences of personal or social injustice or fell back on reasoning that
enabled them to keep their faith in social justice and humanity (‘Just World
narratives’).
Respondent from the control group, B2: “I found out, in life, you just have to make the best
of it. It can be over any time” (…). “You have to be able to deal with difficult situations. You
have to see through the darkness, towards the light.
Such examples of ‘coping’ narratives were not found in the stories from the terrorism unit respondents. Regular detainees were also less distrusting of the prison staff
and held compassionate views of their fellow human beings and their mistakes.
Terrorist unit detainees on the other side tended to judge all events as further contributions to their victimhood, according to multiple accounts of our informants.
Events that had a negative outcome for them were interpreted as deliberate mistreatment and discrimination, even if they probably were not.
A discussion with a focus group of informants inside the prison illustrates this:
I: “Do they talk about discrimination?”
Focus group informant 1: Oh yes. That is the main storyline.
I: The main storyline?
Focus group informant 1 and 2: Yes, they will say they are victims, and the government hates
them.
I: Do you feel that they are more than the other group using stories of discrimination and
deprivation?
Several informants: “Oh yes. All the time”
Focus group informant 1: “Anything. They return from the court, and things did not work
out positively, then everybody is plotting against them. Here, at prison, everyone is plotting
against them.
Adding to this, the inmates at the terrorist unit seem to worry a lot about social
injustice, morality, world problems, and their own destiny, according to informants.
They were described as psychologically vulnerable and less able to cope with setbacks in comparison to the regular detainees, who expressed more healthy coping
strategies.
Informant C4, working inside the prison: “They never felt able to cope with injustice. But
due to the IS ideology, they suddenly feel stronger (…).”
Lastly, we found that the role of religion (Islam) in the development of involvement
in jihadi terrorism is different than often thought. Most of the terrorist detainees
seemed to be not very well informed about the Islam and did not have a thorough
knowledge of the Quran. Instead, they became attracted to the powerful representation of the Salafi – Jihadi discourse on the internet of the Islam as “one universal
truth” in which the hypocrites must be discarded from the true believers. For them,
this resonates with the vague notions of Islam their parents have provided them
with, notably that of ‘being a good Muslim’, and it makes them believe that this
representation of Islam is correct.
Detainee A13 from the terrorist unit explains: “I had quit using alcohol, I was making my
life better. I wanted to be a good Muslim. I was looking for something new, actually I was…
looking for my identity. Then I talked with a couple of men, friends of mine, about Syria and
166
V. Ljujic et al.
they said, that is where you should go. If you want to be significant as a Muslim. There is no
war at all. There are just Muslims who need your help. So I wanted to go there, see what I
could do, make a new start.
Similarly, in the accounts of one detainee in our sample and several informants, it
appears that right-wing extremist detainees were politically not very well informed.
Instead, they were sensitive to the general narrative of ‘the foreign threat to the Dutch
identity and society’ together with a desire to help protect society from these dangers.
Conclusion and Discussion
In this chapter, we first proposed a threat model of terrorism, as a theoretical framework for organizing and interpreting the major socio-economic and psychological
determinants of terrorism involvement. Drawing upon intergroup notions of strain,
perceived threat and significance loss, our model lays out a clear distinction between
proximal and distal threat triggers, and identifies multiple emotional and cognitive
processes linking those triggers to the behavioural outcome: unlawful activity with
terrorist intent.
We utilized recent quantitative and qualitative data to test the model. In the quantitative study we combined and analysed existing data sets that were available for
the complete Dutch population of suspects of terrorist offenses since the introduction of the Crimes of Terrorism Act in 2004. The findings show that terrorism suspects belonged more often to ethnic minority groups, were lower educated, were
unemployed, and were more likely previously involved in crime, than persons from
the general population with the same gender and age. They also more often lost their
job and were detained previous to becoming involved in terrorist offenses. Among
the terrorism suspects, 30% were registered for other criminal offense(s) in the year
before becoming known to police for terrorist offense. In the multivariate analyses
we found that economic adversity and criminality substantially and independently
increase the likelihood of becoming a terrorism suspect for the general population.
These findings offer initial support the proposed threat model as well as its theoretical antecedents (Doosje et al. 2016; see also Ljujic et al. 2017; Pare and Felson
2014). However, terrorism suspects did not differ significantly from general suspects in terms of individual strains and adversities. This means that additional factors and processes are needed to fully understand why people become involved in
terrorist activities.
In the qualitative study, we complemented the quantitative analyses with an in-­
depth account of the motives, experiences and life histories of persons involved in
terrorist activities in the Netherlands. Consistent with the first study, the findings
suggest that terrorist offenders and other, regular, detainees have similar life courses
to a certain extent, and both groups are not very different in socio-economic position and experiences of deprivation and discrimination. Moreover, the qualitative
study shows that both groups also often encountered personal adversities in other
Testing a Threat Model of Terrorism: A Multi-method Study About Socio-Economic…
167
life spheres and were reported to have various types of mental health problems.
Different from general offenders, however, terrorist offenders perceive these setbacks and experiences of deprivation as more severe and signs of social injustice.
We found that this was related to three other characteristics that were more typical
for the terrorism offender group: an instable and impoverished early family life, an
intense search for meaning and identity and need for acceptance, and coping strategies that were not adaptive but instead constantly reaffirmed their perceived victimhood. In the end, these suspects have encountered ‘a bunch of guys’ that introduced
them to a network with an extremist narrative or were attracted by the strong but
simplified narratives they found on the internet. This susceptibility to ideological
(peer) indoctrination went hand in hand with their strong need for significance and
belonging, and may be explained by several psychological conditions, such as
attachment issues and mental disorders that impair social reasoning and impulse
control. The childhood problems of the terrorism suspects may have created a susceptibility to find belonging in deviant social networks. This susceptibility was further aggravated by deprivation, and experiences of discrimination, social exclusion
and loss. The narrative of the extremist networks specifically addresses these feelings of rejection and puts it in a global perspective of urgency, belonging and heroism, as well as personal gain. These processes were most outspoken for suspects
with a jihadi background, but also seemed to be applicable to right-wing extremists.
In sum, the findings support the threat model but also extend it. We found that
distal threat triggers such as conflicts abroad and socio-economic differences within
the population can contribute to emotional and cognitive responses among extremists. Muslim extremism frames group threat as indications of a devalued and discriminated minority, whereas right wing extremism exploits popular resentments
about immigrants, which threaten the ethno-national identity. Besides shaping one’s
cognitive and emotional responses towards ‘threatening’ others (Ljujic et al. 2011),
threats also provide a ‘convenient’ rationale for intergroup violence (Feldman and
Stenner 1997), including terrorism (Staub 2004). However, these extremist narratives may appeal to many, but only a few become actually involved in terrorism. The
results of our research show that proximal personal factors (such as economic hardship and disruptive life experiences), may be crucial to our understanding of involvement in terrorist offenses. Adding to this, our results suggest that early family
experiences, attachment problems, and mental health issues may have contributed
significantly to feelings of perceived threat and a susceptibility to appealing narratives that promise feelings of belonging and significance.
To a certain extent, these life histories that are associated with involvement in
terrorism and extremism may be a matter of chance and a series of bad luck, as well
as meeting the wrong persons or internet sites at the wrong time. However, our
study also provides evidence that one’s path to terrorism is driven by tangible socio-­
economic and psychological factors that might be addressed by professionals, policy makers and the criminal justice system. In this respect, Dutch society is facing a
twofold challenge: to prevent engagement in terrorism, but also, to stimulate de-­
engagement and re-socialization of convicted terrorism offenders. To these ends, a
better understanding of the role of perceived threat in radicalization trajectories (cf.
168
V. Ljujic et al.
McCauley and Moskalenko 2008) is necessary to counter extremism and terrorism
and to prevent recidivism.
It is important to note that our study has various limitations. A strong feature of
our quantitative study was that we were able to get access to data about the complete
population of terrorism suspects since terrorism was distinguished as a separate
offense in the Netherlands. However, a limitation was that we could only retrieve
general information about socio-economic characteristics and previous involvement
in crime, and could not go into detail about life histories and events. The findings
were also limited in the sense that for a part of our sample, we lacked sufficient
information on characteristics such as education and employment situation. A
strong feature of our qualitative study that we gained access to respondents and
informants in specialized prison terrorist units, that enabled us to get access to in-­
depth information about the life histories and personal backgrounds of current and
former terrorism suspects, as well as regular detainees. However, the findings were
limited in the relatively low number of respondents that we could speak, and also
had to rely on information we got from informants. Although the information from
the informants was often consistent and uniform, and were quite similar for those
working inside and outside prison, we cannot rule out the possibility that their
observations are incomplete or that experiences with some detainees in the past
were generalized too much to the complete population.
All in all, our findings offer interesting and plausible insights about the backgrounds of terrorism offenders in the Netherlands and the processes that may lead
to their involvement in terrorist crimes, but our results need to be scrutinized in
future studies to get more certainty about their validity and generalizability. We
therefore hope that the findings presented in this chapter will act as a stimulus for
further research in the field.
References
Agnew, R. (2014). General strain theory. In G. Bruinsma & D. Weisburd (Eds.), Encyclopedia of
criminology and criminal justice (pp. 1892–1900). New York: Springer.
Agnew, R. (2016). General strain theory and terrorism. In G. LaFree & J. D. Freilich (Eds.), The
handbook of the criminology of terrorism (pp. 119–132). Chichester: John Wiley & Sons.
Andersen, H., & Mayerl, J. (2018). Attitudes towards Muslims and fear of terrorism. Ethnic and
Racial Studies, 41(15), 2634–2655.
Andriessen, I., Fernee, H., & Wittebrood, K. (2014). Ervaren discriminatie in Nederland. The
Hague: Sociaal en Cultureel Planbureau.
Bakker, E., & de Bont, R. (2016). Belgian and Dutch jihadist foreign fighters (2012–2015):
Characteristics, motivations, and roles in the War in Syria and Iraq. Small Wars & Insurgencies,
27(5), 837–857.
Balen, M., & van den Bos, K. (2017). Over waargenomen onrechtvaardigheid en radicalisering.
Justitiële Verkenningen, 43(3), 31–44.
Basra, R., & Neumann, P. R. (2016). Criminal pasts, terrorist futures: European jihadists and the
new crime-terror nexus. Perspectives on Terrorism, 10(6), 25–40.
Testing a Threat Model of Terrorism: A Multi-method Study About Socio-Economic…
169
Bergema, R., & van San, M. (2019). Waves of the black banner: An exploratory study on the Dutch
jihadist foreign fighter contingent in Syria and Iraq. Studies in Conflict & Terrorism, 42(7),
636–661.
Borum, R. (2011). Radicalization into violent extremism I: A review of social science theories.
Journal of Strategic Security, 4(4), 7–36.
Bowles, S. (2009). Did warfare among ancestral hunter-gatherers affect the evolution of human
social behaviors? Science, 324(5932), 1293–1298.
Bracha, H. S. (2004). Freeze, flight, fight, fright, faint: Adaptationist perspectives on the acute
stress response spectrum. CNS Spectrums, 9(9), 679–685.
Brewer, M. B. (1999). The psychology of prejudice: Ingroup love and outgroup hate? Journal of
Social Issues, 55(3), 429–444.
Buss, D. (2015). Evolutionary psychology: The new science of the mind. New York: Psychology
Press.
Brewer, M. B., & Campbell, D. T. (1976). Ethnocentrism and intergroup attitudes: East African
evidence. Beverly Hills: Sage.
Choma, B. L., Charlesford, J. J., Dalling, L., & Smith, K. (2015). Effects of viewing 9/11 footage
on distress and Islamophobia: A temporally expanded approach. Journal of Applied Social
Psychology, 45(6), 345–354.
Cuddy, A. J., Glick, P., & Beninger, A. (2011). The dynamics of warmth and competence judgments, and their outcomes in organizations. Research in Organizational Behavior, 31, 73–98.
de Bie, J. L. (2016). How jihadist networks operate: a grounded understanding of changing
organizational structures, activities, and involvement mechanisms of jihadist networks in the
Netherlands. Leiden: Leiden University.
de Bie, J. L., de Poot, C. J., & van der Leun, J. P. (2014). Jihadi networks and the involvement
of vulnerable immigrants: Reconsidering the ideological and pragmatic value. Global Crime,
15(3–4), 275–298.
de Bie, J. L., de Poot, C. J., & van der Leun, J. P. (2015). Shifting modus operandi of jihadist foreign fighters from the Netherlands between 2000 and 2013: A crime script analysis. Terrorism
and Political Violence, 27(3), 416–440.
de Graaf, B. A. (2017). Terrorisme-en radicaliseringsstudies: Een explosief onderzoeksveld.
Justitiele Verkenningen, 43(3), 8–30.
de Poot, C. J., Sonnenschein, A., Soudijn, M. R. J., Bijen, J. G., & Verkuylen, M. W. (2011). Jihadi
terrorism in the Netherlands. The Hague: Boom Juridische Uitgevers.
Decker, S., & Pyrooz, D. (2011). Gangs, terrorism, and radicalization. Journal of Strategic
Security, 4(4), 151–166.
Doosje, B., Loseman, A., & van den Bos, K. (2013). Determinants of radicalization of Islamic
youth in the Netherlands: Personal uncertainty, perceived injustice, and perceived group threat.
Journal of Social Issues, 69(3), 586–604.
Feddes, A. R., Mann, L., & Doosje, B. (2015). Increasing self-esteem and empathy to prevent
violent radicalization: A longitudinal quantitative evaluation of a resilience training focused on
adolescents with a dual identity. Journal of Applied Social Psychology, 45(7), 400–411.
Feddes, A. R., Nickolson, L., & Doosje, B. (2015). Triggerfactoren in het radicaliseringsproces.
Amsterdam: Universiteit van Amsterdam.
Feldman, S., & Stenner, K. (1997). Perceived threat and authoritarianism. Political Psychology,
18(4), 741–770.
Fiske, S. T., Cuddy, A. J., Glick, P., & Xu, J. (2002). A model of (often mixed) stereotype content:
Competence and warmth respectively follow from perceived status and competition. Journal of
Personality and Social Psychology, 82(6), 878–902.
Gallagher, M. J. (2014). Terrorism and organised crime: Co-operative endeavours in Scotland?
Terrorism and Political Violence, 26(2), 320–336.
Glick, P. (2002). Sacrificial lambs dressed in wolves’ clothing. In L. S. Newman & R. Erber (Eds.),
Understanding genocide: The social psychology of the Holocaust (pp. 113–142). London:
Oxford University Press.
170
V. Ljujic et al.
Huddy, L., Feldman, S., & Weber, C. (2007). The political consequences of perceived threat and
felt insecurity. The Annals of the American Academy of Political and Social Science, 614(1),
131–153.
Hutchinson, S., & O’Malley, P. (2007). A crime–terror nexus? Thinking on some of the links
between terrorism and criminality. Studies in Conflict Terrorism, 30(12), 1095–1107.
Joosen, K., & Slotboom, A. M. (2015). Terugblikken op de aanloop: Dynamische voorspellers van
perioden van detentie gedurende de levensloop van vrouwelijke gedetineerden in Nederland.
Tijdschrift voor Criminologie, 57(1), 84–98.
Kakar, S. (1996). The colors of violence: Cultural identities, religion, and conflict. Chicago:
University of Chicago Press.
King, M., & Taylor, D. M. (2011). The radicalization of homegrown jihadists: A review of theoretical models and social psychological evidence. Terrorism and Political Violence, 23(4),
602–622.
Klausen, J. (2015). Tweeting the Jihad: Social media networks of Western foreign fighters in Syria
and Iraq. Studies in Conflict & Terrorism, 38(1), 1–22.
Koomen, W., & van der Pligt, J. (2009). Achtergronden en determinanten van radicalisering en
terrorisme. Tijdschrift voor Criminologie, 51(4), 345–359.
Kruglanski, A. W., Gelfand, M. J., Bélanger, J. J., Sheveland, A., Hetiarachchi, M., & Gunaratna,
R. (2014). The psychology of radicalization and deradicalization: How significance quest
impacts violent extremism. Political Psychology, 35(S1), 69–93.
Kruglanski, A. W., Jasko, K., Chernikova, M., Dugas, M., & Webber, D. (2017). To the fringe
and back: Violent extremism and the psychology of deviance. American Psychologist, 72(3),
217–230.
Li, Q., & Brewer, M. B. (2004). What does it mean to be an American? Patriotism, nationalism,
and American identity after 9/11. Political Psychology, 25(5), 727–739.
Ljujic, V., van Prooijen, J. W., & Weerman, F. (2017). Beyond the crime-terror nexus: Socio-­
economic status, violent crimes and terrorism. Journal of Criminological Research, Policy and
Practice, 3(3), 158–172.
Makarenko, T. (2012). Foundations and evolution of the crime–terror nexus. In F. Allum & S.
Gilmour (Eds.), Routledge handbook of transnational organized crime (pp. 252–267). New
York: Routledge.
McCauley, C., & Moskalenko, S. (2008). Mechanisms of political radicalization: Pathways toward
terrorism. Terrorism and Political Violence, 20(3), 415–433.
Moghaddam, F. (2005). The staircase to terrorism: A psychological exploration. American
Psychologist, 60(2), 161–169.
Neuberg, S. L., & Cottrell, C. A. (2006). Evolutionary bases of prejudices. In M. Schaller, J. A.
Simpson, & D. T. Kenrick (Eds.), Evolution and Social Psychology (pp. 163–187). New York:
Psychology Press.
Neuberg, S. L., Kenrick, D. T., & Schaller, M. (2011). Human threat management systems: Self-­
protection and disease avoidance. Neuroscience & Biobehavioral Reviews, 35(4), 1042–1051.
Pare, P. P., & Felson, R. (2014). Income inequality, poverty and crime across nations. The British
Journal of Sociology, 65(3), 434–458.
Ranstorp, M. (1996). Terrorism in the name of religion. Journal of International Affairs, 50(1),
41–62.
Riek, B. M., Mania, E. W., & Gaertner, S. L. (2006). Intergroup threat and outgroup attitudes: A
meta-analytic review. Personality and Social Psychology Review, 10(4), 336–353.
Sageman, M. (2004). Understanding terror networks. Philadelphia: University of Pennsylvania
Press.
Sageman, M. (2008). The next generation of terror. Foreign Policy, 165(March/April), pp. 36–42.
Schmid, A. P. (2004). Frameworks for conceptualising terrorism. Terrorism and Political Violence,
16(2), 197–221.
Schmid, A. P. (2011). The Routledge handbook of terrorism research. London/New York:
Routledge.
Testing a Threat Model of Terrorism: A Multi-method Study About Socio-Economic…
171
Schmid, K., & Muldoon, O. T. (2015). Perceived threat, social identification, and psychological
well-being: The effects of political conflict exposure. Political Psychology, 36(1), 75–92.
Schmitt, D. P., & Pilcher, J. J. (2004). Evaluating evidence of psychological adaptation: How do
we know one when we see one? Psychological Science, 15(10), 643–649.
Shadid, W. A. (1991). The integration of Muslim minorities in the Netherlands. International
Migration Review, 25, 355–374.
Staub, E. (2004). Understanding and responding to group violence: Genocide, mass killing, and terrorism. In F. M. Moghaddam & A. J. Marsella (Eds.), Understanding terrorism: Psychosocial
roots, consequences, and interventions (pp. 151–168). Washington: American Psychological
Association.
Stephan, W. G., & Stephan, C. W. (2005). In J.F. Dovidio, Glick, P., & Rudman, L.A. (Eds.)
Intergroup relations program evaluation. On the nature of prejudice: Fifty years after Allport
(pp. 431–446). Malden, MA: Blackwell Publishing.
Stephan, C. W., & Stephan, W. S. (2013). An integrated threat theory of prejudice. In S. Oskamp
(Ed.), Reducing prejudice and discrimination (pp. 33–56). New York/London: Psychology
Press.
Tajfel, H., & Turner, J. C. (1979). An integrative theory of intergroup conflict. In W. Austin & S.
Worchel (Eds.), The social psychology of intergroup relations (pp. 33–47). Monterey: Brooks/
Cole.
Van Ham, T., Hardeman, M., Van Esseveldt, J., Lenders, A., & Van Wijk, A. (2018). A view on
left-wing extremism: An exploratory study into left-wing extremist groups in the Netherlands.
Den Haag: WODC.
van Prooijen, J. W., Krouwel, A. P., & Pollet, T. V. (2015). Political extremism predicts belief in
conspiracy theories. Social Psychological and Personality Science, 6(5), 570–578.
Veldhuis, T., & Bakker, E. (2009). Muslims in the Netherlands: Tensions and violent conflict
(MICROCON Policy Working Paper 6). Brighton: MICROCON.
Vellenga, S. (2018). Anti-Semitism and Islamophobia in the Netherlands: Concepts, developments, and backdrops. Journal of Contemporary Religion, 33(2), 175–192.
Verkuyten, M. (2018). Religious fundamentalism and radicalization among Muslim minority
youth in Europe. European Psychologist, 23(1), 21–31.
Versteegt, I., Ljujic, V., El Bouk, F., Weerman, F., & van Maanen, F. (2018). Terrorism, adversity
and identity. A qualitative study on detained terrorism suspects in comparison to other detainees. Amsterdam: NSCR.
Victoroff, J. E., & Kruglanski, A. W. (2009). Psychology of terrorism: Classic and contemporary
insights. New York: Psychology Press.
Visser-Vogel, E., de Kock, J., Bakker, C., & Barnard, M. (2018). I have Dutch nationality, but
others do not see me as a Dutchman, of course. Journal of Muslims in Europe, 7(1), 94–120.
Weenink, A. W. (2015). Behavioral problems and disorders among radicals in police files.
Perspectives on Terrorism, 9(2), 17–33.
Weggemans, D., Bakker, E., & Grol, P. (2014). Who are they and why do they go? The radicalization and preparatory processes of Dutch jihadist foreign fighters. Perspectives on Terrorism,
8(4), 100–110.
Wittendorp, S., de Bont, R., Bakker, E., & de Roy van Zuijdewijn, J. (2017). Persoonsgerichte
aanpak Syrië/Irak-gangers. Leiden: Universiteit Leiden.
Zick, A., Pettigrew, T. F., & Wagner, U. (2008). Ethnic prejudice and discrimination in Europe.
Journal of Social Issues, 64(2), 233–251.
Part II
Factors Affecting Recruitment to
Organized Crime
Systematic Review of the Social,
Psychological and Economic Factors
Relating to Involvement and Recruitment
into Organized Crime
Tommaso Comunale, Francesco Calderoni, Martina Marchesi,
Elisa Superchi, and Gian Maria Campedelli
Background: Recruitment into Organized Crime
Organized crime (henceforth OC) differs from general and serious crime due to the
higher complexity of the criminal activities, often requiring a network of transnational contacts to identify suitable and trustworthy co-offenders or contacts with the
legal world (Cornish and Clarke 2002; Kleemans and De Poot 2008). The relevance
of social ties among OC offenders and the social environment constitutes the heart
of early studies on criminal organizations as the mafias (Albini 1971; Cressey 1969;
Ianni 1974). The social embeddedness of OC drove more recent analyses on the
sociocultural processes shaping recruitment pathways and criminal careers of OC
offenders (Kleemans and De Poot 2008; Kleemans and Van de Bunt 1999, 2008;
Kleemans and Van Koppen 2014). The complex dynamics underlying individuals’
involvement into OC have contributed to the resilience of organized crime groups
(henceforth OCGs), one of their most distinct features. The ability of rapidly reorganizing and constantly recruiting new members has also favored the consolidation
of OCGs in some geographic areas (e.g. the mafias in Italy). Literature on recruitment into OC has not only focused on social factors for involvement into OCGs, but
scientific enquiries have also investigated psychological (Ostrosky et al. 2012) and
economic factors (Lavezzi 2008, 2014).
As for social factors, people get involved into OC through social and work ties.1
Social ties with co-offenders and with the legal world play a central role in the success
of OC-related activities. Furthermore, social ties may create a “social snowball effect”,
Involvement into OC also takes place through leisure activities, because of life events or through
deliberate recruitment by criminal organizations. For more details, see Kleemans and Van Koppen
(2014).
1
T. Comunale (*) · F. Calderoni · M. Marchesi · E. Superchi · G. M. Campedelli
Università Cattolica del Sacro Cuore and Transcrime, Milan, Italy
e-mail: tommaso.comunale@unicatt.it
© Springer Nature Switzerland AG 2020
D. Weisburd et al. (eds.), Understanding Recruitment to Organized Crime
and Terrorism, https://doi.org/10.1007/978-3-030-36639-1_8
175
176
T. Comunale et al.
a process in which people get involved in OC through people that are close to them
(Kleemans and Van Koppen 2014, p. 288). Relations between individuals bridge
social and criminal networks – also across countries – providing new criminal opportunities and solve problems of cooperation in hostile environments in which offenders
carry out illegal activities. Opportunities for committing OC may also arise through
work ties. Occupation settings offer good opportunities to gain trust in someone else,
essential for activities involving financial and other risks. For instance, working in the
mobility, transport, and logistics sector may provide opportunities for cross-border
OC activities. Criminal co-operations therefore may be established through peoples’
international contacts and travel movements; through their individual freedom of
movement; and through their occupations enabling them to meet with potential cooffenders (Kleemans and Van de Bunt 2008). Once part of a criminal network, one’s
criminal career can take different paths depending on his/her roles and responsibilities. In this regard, Kleemans and de Poot (2008) highlight four major roles: offenders
with strong local roots, individuals specialized in some activities, individuals obtaining increasing roles through capital accumulation, and offenders who possess specific
skills or expertise that make the other offenders dependent from them. For these reasons, recruitment into OCGs and criminal careers can also take place during adulthood among late starters – i.e. adult members with no previous criminal involvement
(Kleemans and Van Koppen 2014). Thus, a career in OC does not necessarily start in
early adolescence, where individual characteristics and long-term risk factors may
serve as an explanation for a lifetime involvement in crime.
Psychological factors have also been assumed to influence individuals’ recruitment
into OCGs. Information on psychological traits of OC offenders, however, is limited
because of the relatively small population, which is difficult to reach also in contexts
of detention. Prior studies about OC relied on the Psychopathy Check List-­Revised
(Ostrosky et al. 2012), a controversial instrument resting on the contested concept of
psychopathy, bearing a number of limitations (Jones et al. 2013). Other neuroscientific tools such as neuropsychological and genetic tests, as well as neuroimaging, are
widely used in courts to explain and sometimes justify criminal behavior (Walsh and
Beaver 2009). To advance the understanding of the psychological determinants of
criminal behavior, such tools might be adopted for criminological purposes. Moreover,
when investigating the psychological factors for the recruitment into OCGs, researchers may also take into consideration other types of disorders, e.g. substance abuse
disorders, low self-control and/or a history of past disorders and negative development.
Economic risk factors have also emerged as relevant in addressing the processes
shaping individuals’ recruitment into OCGs. Lavezzi (2008, 2014), for instance,
identified several aspects that make Sicily’s economy vulnerable to OC penetration.
Extortion and protection are common in Sicily, whose economy is characterized by
a large proportion of small firms, large sectors of traditional/low-tech economic
activity, a large construction sector, and a large public sector (Lavezzi 2008).
Opportunities for OCGs also emerge from impairments to the rule of law and the
presence of illegal and informal markets (Bandiera 2003). Fluctuations and
­irregularities in the credit markets, for example, may create opportunities for usury.
In addition, inequality has been indicated as a possible facilitator in the emergence
of OCGs. Data from Italian regions show a remarkable correlation between high-­
Systematic Review of the Social, Psychological and Economic Factors Relating…
177
income inequality and the spread of OC (Daniele 2009). The majority of scientific
studies has focused on the relation between economic risk factors and OC at the
macro-level, but economic disadvantages can also influence the individuals’ propensity to join OCGs (Carvalho and Soares 2016).
Despite the increasing number of studies on several aspects of OC, to date little
systematized information is available on the social, psychological and economic
factors that lead to involvement in OC. This systematic review embraces a broad
perspective encompassing several aspects related to recruitment into OCGs (e.g.
age, gender, social ties, economic conditions, criminal background and skills).2
In line with these purposes, this systematic review firstly aims at identifying the
current knowledge on social, psychological, and economic factors relating to
recruitment to OCGs. It will also highlight whether these factors are independent of
one other or they are correlated. Secondly, this review aims at assessing the validity
and generalizability of research findings of studies employing different research
methods and focusing on different countries. In this regard, this systematic review
seeks to answer two sets of research questions:
• What are the most commonly reported social, psychological, and economic factors leading to criminalisation and recruitment into OC networks? Are them to
be viewed independently of one another?
• Which methods do included studies apply? Are finding consistent through studies
employing different methods and adopting different geographic scopes?
The systematic assessment of the empirical evidence on such factors contributes
to the consolidation of the knowledge on involvement into OC and may inform the
policy making process. In addition, research findings will serve to set direction for
future enquiries aimed at revealing the underlying dynamics of recruitment
into OCGs.
Methodology
Operational Definitions of Organized Crime
This study aims at revealing the factors associated with recruitment into OC. The
concept of recruitment refers to the different processes leading individuals to the
stable involvement into OCGs. While this interpretation is broader than the formal
affiliation to any OCG, it excludes individuals occasionally cooperating or co-­
offending with OCGs.
Previous systematic reviews have focused on youth gang membership and interventions
(Hodgkinson et al. 2009; Klein and Maxson 2006). The Campbell Collaboration, for example, has
published two systematic reviews on the involvement of young people in gangs (Fisher et al.
2008a, b), and more recently one on predictors of youth gang membership in low- and middleincome countries (Higginson et al. 2014). These reviews did not consider the factors relating to
membership in other types of groups involved in crime, namely OCGs.
2
178
T. Comunale et al.
As for organized crime, divergent approaches adopted by governments and policymakers for long resulted in the difficulty to produce a uniform definition (see
Paoli 2014a).
This systematic review adopts the definition of organized crime (OC) by the
United Nations Convention against Transnational Organized Crime (United Nations
2000, p. 5):
‘Organized criminal’ group shall mean a structured group of three or more persons, existing for a period of time and acting in concert with the aim of committing one or more serious crimes or offences established in accordance with this Convention, in order to obtain,
directly or indirectly, a financial or other material benefit.
The UN definition is generally accepted from a legal perspective, though some
scholars have criticized it for being rather generic and unspecific (Albrecht and
Fijnaut 2002; Paoli 2014a). Despite limitations, the UN definition encompasses different forms of OC, allowing this systematic review to include several types of
OCGs: mafias, DTOs, gangs, and a residual category labelled “other criminal
organizations”.
Mafias are characterized by a remarkable longevity, an organizational and cultural complexity enforcing the respect of the code of silence (i.e. omertà). In addition, mafias’ ability to control legitimate markets and to exercise a political dominion
over their areas of settlement, frequently using private violence and simultaneously
supplying protection against extortion, competitors and law enforcement
(Finckenauer 2007; Gambetta 1993; Paoli 2014b; Varese 2010). DTOs are complex
organizations involved in the production, transport and/or distribution of large
quantities of illicit drugs through a business-like structure (Clapper 2015; Knox and
Gray 2014; U.S. Department of Justice 2010). As regards to gangs, given the important share of adult offenders in OC and the relevance of the ties to the legitimate
world, this study excludes youth (street) gangs and prison gangs in favor of criminal
gangs composed of adults with different degrees of organizational structure.3 This
study therefore considers “criminal gangs” those groups of adults following a code
of conduct, having common beliefs and existing in a semi- structured organization
oriented to accomplish their goals through criminal activity (Langston 2003). Lastly,
the label “other criminal organizations” encompasses different groups that “utilize
violence or threats of violence, provide illicit goods that are in public demand, and
assure immunity for their operators through corruption and enforcement” (Hagan
2015, p. 395). These comprise for instance outlaw motorcycle gangs and other
OCGs active in specific world regions (e.g. the Balkans).
This choice is also due to the fact that the literature generally considers youth street gangs as different from OCGs (Decker and Pyrooz 2014). Furthermore, a recent systematic review has already
assessed the factors leading to youth gang membership (Higginson et al. 2014). Similarly, while
there is a relevant literature on prison gangs, this field is mostly separate from the literature on OC,
which emphasizes the social embeddedness and the role of ties with the legitimate world. Prison
gangs, on the contrary, occur in a specific and institutionalized settings and recruitment is influenced by contextual factors (Blevins et al. 2010; Wood et al. 2014).
3
Systematic Review of the Social, Psychological and Economic Factors Relating…
179
Search Strategy and Selection of the Relevant Studies
This systematic review relies on academic and grey literature retrieved from 12
electronic databases in English, French, German, Italian, and Spanish.4 The databases include different research fields, without limitations as to their year of publication or geographic origin.
A three-fold query structure incorporated information on social, psychological,
and economic factors relating to the recruitment into mafias, DTOs, gangs, and
other criminal organizations. The queries combined search terms from each of the
three main categories, i.e. type of OCGs, the type of factors, and recruitment. The
Boolean operator “OR” connected keywords of the same category, while the
Boolean operator “AND” connected keywords from different categories. This query
structure ensured the collection of all the studies indexed in the electronic databases
containing at least one term from each semantic category.
The search led to the collection of 48,731 unique studies. A systematic screening
of these studies selected the relevant information according to shared eligibility criteria. Firstly, a team of trained researchers screened the titles and abstracts of each
study to include only the literature making an original research contribution (e.g.
excluding news articles or reviews of any type) to the social, psychological, and economic factors relating to the recruitment into OCGs. Of the initial studies, 118 met
the inclusion criteria. This initial list of studies was then integrated with additional
literature from their bibliographies, as well as with the suggestions of several experts
in the field of OC.5 These activities led to a total of 130 studies ­available for full-text
screening. Secondly, the full-text screening further selected the studies according to
stricter criteria. Only empirical studies were included. Of the remaining 57 empirical
studies, 47 studies had a clear research aim and an appropriate research methodology, design, recruitment strategy, and data collection.6
This systematic review included studies adopting quantitative, qualitative, or
mixed-methods approaches. Systematic reviews have generally excluded qualitative
research although there has been much debate on its incorporation (see Dixon-­
English: Criminal Justice Abstracts; Open Grey; Social Sciences Premium, NJCRS, PsycInfo,
Abi/Inform, International Bibliography of the Social Sciences, Public Health Database, Military
Database, EconLit, PsycArticles; PubMed; Scopus; Web of Science. French: Google Scholar;
Sudoc.Abes. German: Sowiport. Italian: Riviste Web. Spanish: Liliacs; Latin America & Iberia
Database.
Dutch was excluded from the search as contacts with Dutch scholars confirmed that empirical
studies in this field have also been published in English.
5
The experts that contributed to this systematic review are: Jay Albanese (Virginia Commonwealth
University, USA), Paolo Campana (University of Cambridge, UK), Scott Decker (Arizona State
University, USA), Edward Kleemans (Vrije University of Amsterdam, NL), Klaus Von Lampe
(John Jay College of Criminal Justice, USA), Carlo Morselli (University of Montreal, CA), Letizia
Paoli (Katholieke Universiteit Leuven, BE), David Pyrooz (University of Colorado Boulder,
USA), Sonja Wolf (Centro de Investigación y Docencia Económicas, MEX).
6
The included studies meet the quality criteria set out by an adapted version of the Critical
Appraisal Skills Programme (2017) for qualitative studies.
4
180
T. Comunale et al.
Woods et al. 2006). The reason relies on the fact that systematic reviews aim at
studying correlates and risk factors–or at addressing the effectiveness of intervention programs–which require quantitative studies as the primary basis (for risk factors, see Murray et al. 2009). Excluding qualitative contributions from the review,
however, could have impacted the research findings, as an important amount of
organized crime studies employ either qualitative or mixed-methods approaches.
This systematic review therefore considered the inclusion of such methods to provide a more comprehensive, albeit descriptive, overview about the factors leading to
recruitment into OCGs.7
In addition, this study relied on grey literature to validate the research findings.
Inclusion of grey literature allows to “take into account some important contextual
information, without losing the level of rigor required for a systematic review”
(Benzies et al. 2006, p. 59). The grey literature considered all available reports
issued by the Italian governmental, judicial, and law enforcement institutions on the
presence of the Italian mafias in Italy and abroad, namely the Italian Parliamentary
Anti-Mafia Commission (CPA), the Italian National Anti-Mafia and Counterterrorism
Directorate (DNA), and Anti-Mafia Investigative Directorate (DIA). These sources
are relevant as the mafias have some peculiarities differentiating them from the
other types of OCGs. Only reports containing relevant information for the purposes
of this review were used to corroborate results, namely 8 reports issued by the CPA,
9 by the DNA, and 23 by the DIA.
Results
Description of the Included Studies
The included studies were published between 1969 and 2017, spanning different
geographical regions and languages. They also differ according to the type of
sources: 6% (n = 3) are dissertations, 36% (n = 17) are books or chapters, and 58%
(n = 27) are journal articles. The articles come from 19 journals, mostly pertaining
to criminology and related fields of studies.8 The included studies also differ regard-
This systematic review was conducted following in part the guidelines provided by the Campbell
Collaboration–an international research network promoting and producing systematic reviews–as
Campbell reviews are based solely on quantitative findings as primary basis for conclusions. For
more details, see https://www.campbellcollaboration.org/library/campbell-collaboration-systematic-reviews-policies-and-guidelines.html
8
The journals are: British Journal of Criminology; Crime Law & Social Change; Trends in
Organized Crime; European Journal of Criminology; Global Crime; Canadian Journal of
Criminology; Criminal Behaviour and Mental Health; Criminology; European Sociological
Review; International Journal of Social Psychology; Journal of Criminal Justice; Journal of
Economic Behavior & Organization; Justice Policy Journal; Law & Society Review; Policing: An
International Journal of Police Strategies & Management; Research and Reports in Forensic
Medical Science; Revista Electrónica de Ciencia Penal y Criminología; Social Problems; The
Howard Journal of Crime and Justice.
7
Systematic Review of the Social, Psychological and Economic Factors Relating…
181
ing the type of OCGs they focus on. Almost half (42%, n = 20) deal with the mafias,
especially with the Italian ones, 30% (n = 14) discuss about other criminal organization, above all Dutch ones, and the remaining about gangs (15%, n = 7), and DTOs
(13%, n = 6).
The selected studies rely on different types of data collection and methods of
analysis. In investigating the social, psychological, and economic factors relating to
the recruitment into OCGs, they use both primary and secondary data, and often the
combination of the two (Fig. 1, on the left). Due to the difficulties to study the
recruitment into OCGs, almost half of the studies (49%, n = 23) relied on the information coming from official data, investigative and judicial files, as well as other
documents (e.g. bibliographies and tapes). The remaining half of the studies either
integrated information from secondary data with interviews (23%, n = 11), or conducted their research entirely through surveys, interviews, and conversations with
informants (28%, n = 13).
The studies applied different methods of analysis (Fig. 1, on the right). More
than half of them (57%, n = 27) favored a qualitative approach in dealing with the
topic of factors relating to the recruitment into OCGs. The remaining adopted either
quantitative (26%, n = 12) or mixed-methods approaches (17%, n = 8) (see Tables
1, 2, and 3, respectively). The scarcity of quantitative studies may be due to the topic
of the research itself, i.e. the recruitment into OCGs, is not particularly suitable for
such methodological approach. The quantitative approach is further hindered by the
difficulties in operationalizing and measuring the social, psychological, and economic factors intervening in the recruiting process.
28%
23%
49%
Primary data
Secondary data
Primary and secondary data
17%
26%
57%
Quantitative
Qualitative
Mixed-methods
Source: authors’ elaboration of the studies included in this systematic review.
Fig. 1 Types of data collection and methods of analysis (n = 47). (Source: authors’ elaboration of
the studies included in this systematic review.)
190
4109
DTOs
Jhi and Gerber Gangs
(2015)
Other Criminal
Organizations
Gangs
Gangs
Carvalho and
Soares (2016)
Kirby et al.
(2016)
Kissner and
Pyrooz (2009)
May (2009)
138
200
230
Type of OCG
Other Criminal
Organizations
Source
Blokland et al.
(2017)
Survey
Interviews
Official data
Survey
Interviews
Data
Samplea collection
601
Official data
Table 1 Details on the included quantitative studies
Descriptive statistics
Correlation
Logistic regression
Logistic regression
Descriptive statistics
Chi square
Kruskal-­Wallis test
Descriptive statistics
Logistic regression
Data analysis
Descriptive statistics
T-test
Chi square
Logistic regression
Descriptive statistics
Mincerian regression
Categories of
factors
Age
Criminal
background and
skills
Age
Ethnicity
Educational
background
Economic
conditions
Employment
Economic
conditions
Age
Gender
Ethnicity
Criminal
background and
skills
Age
Social ties
Psychological
factors
Group identity
Psychological
factors
Gang membership is positively
associated with unemployment
Compared with general crime
offenders, OC offenders are more
predominantly male, more
ethnically heterogeneous and
with more drug offences records
Persistent gang involvement is
associated with poor self-control
Gangs constitute a form of social
support for members
U.K.
U.S.
U.S.
Relevant findings
Outlaw motorcycle gangs’
membership is positively
associated with previous criminal
records
Individuals join DTOs for
monetary returns
U.S.
Brazil
Geographic
scope
Netherlands
182
T. Comunale et al.
2384
69
230
222
OCGs
Mafias
Salinas and
Regadera
(2016)
Schimmenti
et al. (2014)
Unlu and Ekici DTOs
(2012)
Wang (2013)
Interviews
Investigative
files
Interviews
Investigative
files
Investigative
files
Interviews;
Documents
Content analysis
CHAID
Logistic regression
Descriptive statistics
T-test
Chi square
Logistic regression
Descriptive statistics
Chi square
Descriptive statistics
Descriptive statistics
Descriptive statistics
a
The sample reports the number of individuals included in the studies
DTOs
200
OCGs
Requena et al.
(2014)
82
OCGs & DTOs
Ostrosky et al.
(2012)
Age
Gender
Economic
conditions
Ethnicity
Employment
Economic
conditions
Social ties
Age
Economic
conditions
Psychological
factors
Gender
Social ties
Silence/Omertà
Age
Gender
Ethnicity
Social ties
Criminal
background and
skills
Psychological
factors
High levels of antisocial traits
and low levels of interpersonalaffective traits of psychopathy
characterize mafia members
Male adults from low-income
societies can join DTOs and
work as couriers for monetary
returns
Early starters get involved in
DTOs because of entertainment
expenses, while late starters
because of financial difficulties
Italy
U.K.
Turkey
Spain
Spain
Individuals join DTOs seeking
for higher economic income and
a lifestyle characterized by the
accumulation/showing off of
material values
Women get involved in OCGs
through their personal networks,
i.e. family ties and emotional ties
Individuals get involved in OCGs
because they possess special
expertise developed outside the
criminal world
Mexico
Systematic Review of the Social, Psychological and Economic Factors Relating…
183
Interviews
Investigative files
Investigative files
Judicial records
Interviews
Documents
Mafias
Behan (1996)
Brancaccio (2017) Mafias
Brotherton and
Barrios (2004)
Gangs
Other Criminal Interviews
Organizations Investigative files
Judicial records
Arsovska (2015)
Interviews
Investigative files
Judicial records
Mafias
Arlacchi (1983)
Data collection
Interviews
informants
Documents
Type of OCG
Mafias
Source
Albini (1971)
Table 2 Details on the included qualitative studies
Categories of factors
Educational background
Economic conditions
Social ties
Group identity
Criminal background and skills
Silence/Omertà
Age
Educational background
Social ties
Group identity
Criminal background and skills
Age
Ethnicity
Economic conditions
Social ties
Group identity
Criminal background and skills
Age
Economic conditions
Social ties
Criminal background and skills
Employment
Economic conditions
Social ties
Criminal background and skills
Economic conditions
Group identity
Individuals are recruited into OCGs based on
ethnic ties, kinship ties, and display of violent
behavior
Incarcerated individuals and especially
youngsters attracted by the cult of violence
can join the mafias
Individuals enter the mafias because of
kinship and blood ties, coupled with low
economic conditions and violent/risk taking
behavior
While females join gangs through blood ties,
males rely on kinship and social relations
developed in prison
Balkans
Italy
Italy
U.S.
Individuals who get involved in mafias come
from the middle-class, have an educational
background and possess managerial skills
Italy
Geographic scope Main findings
Italy
Recruitment of individuals into OCGs is also
based on friendship, kinship, contract, and
patron-client relationships
184
T. Comunale et al.
Type of OCG
Mafias
Mafias
DTOs
Gangs
Mafias
DTOs
Gangs
Source
Ciconte (1992)
Cressey (1969)
Decker and
Chapman (2008)
Densley (2012)
Gambetta (1993)
García (2006)
Gordon (2000)
Interviews
Tapes and CDs
Interviews
Judicial records
Ethnicity
Economic conditions
Social ties
Canada
(continued)
Individuals get involved in DTOs because of
their need of power, belonging, respect,
security, and pride
Individuals often access gangs through close
friends due to ethnic marginality and the
attraction of supportive peer groups
Individuals are recruited into gangs based on
personal features like criminal competency
and group loyalty
Being able to enforce the code of silence and
possessing relevant expertise are crucial
factors for being recruited into the mafias
Ethnic ties have a crucial role in DTOs
membership
U.S.
Latin America
U.K.
Values like honor, loyalty, and silence are
crucial for individuals aiming at joining the
mafias
U.S.
Geographic scope Main findings
Italy
Kinship and blood ties and the lack of
legitimate occupations facilitate the
involvement into the mafias
Italy
Employment
Social ties
Group identity
Criminal background and skills
Silence/Omertà
Group identity
Mexico
Categories of factors
Age
Ethnicity
Educational background
Employment
Economic conditions
Social ties
Criminal background and skills
Silence/Omertà
Age
Interviews
Investigative files Ethnicity
Judicial records Social ties
Group identity
Criminal background and skills
Silence/Omertà
Interviews
Ethnicity
Economic conditions
Social ties
Criminal background and skills
Interviews
Group identity
Criminal background and skills
Data collection
Judicial records
Documents
Systematic Review of the Social, Psychological and Economic Factors Relating…
185
Type of OCG
Mafias
Gangs
Mafias
Mafias
Mafias
Mafias
Mafias
Source
Hess (1993)
Hixon (2010)
Lo (2010)
Lupo (1993)
Paoli (2003)
Sales (2015)
Sciarrone (2014)
Table 2 (continued)
Judicial records
Judicial records
Documents
Interviews
Documents
Judicial records
Documents
Documents
Interviews
Data collection
Judicial records
Documents
Italy
Educational background
Employment
Economic conditions
Social ties
Criminal background and skills
Social ties
Italy
China
Social ties
Group identity
Criminal background and skills
Silence/Omertà
Italy
Ethnicity
Social ties
Criminal background and skills
Silence/Omertà
Italy
Social ties
Group identity
Silence/Omertà
Categories of factors
Geographic scope
Italy
Educational background
Economic conditions
Social ties
Group identity
Criminal background and skills
Silence/Omertà
U.S.
Gender
Group identity
Psychological factors
The mafias mainly recruit new members
based blood and kinship ties which are
reinforced through an initiation ceremony
with specific rituals
The contract of fraternization among
recruited mafia members extends the bonds
of loyalty and obligation beyond family ties,
providing mutual support and trust
Individuals capable of strategic use of
violence are recruited into the mafias
The mafias mainly recruit new members
based on ethnicity and kinship and blood ties
Individuals recruited into OCGs usually have
an history of negative and arrested
development resulting in antisocial
personality disorders
Being able to connect people from different
environments favor recruitment into Chinese
Triads
Main findings
Individuals get involved in the mafias through
social relations, especially because of their
ability to connect the criminal members with
other third parties, like other criminal groups
or representative of legal businesses
186
T. Comunale et al.
Zhang and Chin
(2002)
Varese (2011b)
Varese (2006)
Varese (2001)
Van San and
Sikkens (2017)
Van Koppen
(2013)
Source
Sergi (2016)
Geographic scope Main findings
Italy
Being part of an OCG results from cultural
transmission and gradual learning, therefore
kinship and blood ties have a crucial role in
the recruitment of new members
Netherlands
Individuals engage in OC activities exploiting
their skills and kinship and blood ties, as
criminals prefer to unfold their activities with
family members or close friends
Netherlands
Female smugglers join DTOs mainly through
DTOs
Interviews
Gender
Peru
their personal networks, i.e. family ties,
Informants
Economic conditions
romantic relationships, and friendships
Social ties
Social ties
Russia
Individuals getting involved in the mafias are
Mafias
Interviews
recruited from a pool of trusted aspirants with
Investigative files Criminal background and skills
no previous connections with lawJudicial records
enforcement agents
Documents
Mafias
Documents
Social ties
Italy
The mafias kin-based system of recruitment
facilitates transplantation of criminal
activities in a new region: when an entire
blood family migrates the criminal group
automatically reconstitutes itself
When Russian mafia groups migrates, they
Italy
Ethnicity
Mafias
Interviews
recruit new local members based on their
Hungary
Judicial records Social ties
dependability and proven ability to use
Criminal background and skills U.S.
Documents
violence
China
Other Criminal Interviews
Ethnicity
U.S.
Individuals enter Chinese Triads because of
Organizations
Group identity
China
their commitment to making money and
direct connections in the Chinese
communities
Type of OCG
Data collection
Categories of factors
Other Criminal Investigative files Economic conditions
Organizations Documents
Social ties
Group identity
Psychological factors
Other Criminal Investigative files Employment
Organizations
Economic conditions
Social ties
Systematic Review of the Social, Psychological and Economic Factors Relating…
187
Other Criminal Investigative files
Organizations
Mafias
Other Criminal Interviews
Organizations Survey
Other Criminal Investigative files
Organizations
Other Criminal Investigative files
Organizations
Mafias
Mafias
Kleemans and Van
de Bunt (2008)
Morselli (2003)
Salinas, Requena
and de la Corte
(2011)
Van Koppen et al.
(2010b)
Van Koppen et al.
(2010a)
Varese (2011a)
Varese (2013)
Investigative files
Investigative files
Investigative files
Documents
Type of OCG
Data collection
Other Criminal Investigative files
Organizations
Source
Kleemans and de
Poot (2008)
Table 3 Details on the included mixed-methods studies
Gender
Ethnicity
Social ties
Gender
Ethnicity
Social ties
Age
Gender
Employment
Social ties
Criminal background and skills
Age
Criminal background and skills
Criminal background and skills
Social ties
Criminal background and skills
Categories of factors
Age
Employment
Social ties
Criminal background and skills
Employment
Social ties
Netherlands Most of individuals get involved in OCGs when
they are adults
Netherlands Compared with general crime offenders, OC
offenders more often have previous and serious
judicial records
Italy
Women getting involved in the mafias have a
more relevant role abroad than in their territory
of origin
Italy
Individuals getting involved in the mafias
abroad mainly focus on economic investments
and resource acquisition
Netherlands Social relations in leisure and work settings
may provide opportunities for joining OCGs
throughout individuals’ lives
U.S.
Social relations and their management are
crucial in the involvement and career in the
mafias
Spain
Individuals join OCGs because their
employment could favor illegal activities or to
have an additional income to their salary
Geographic
scope
Main findings
Netherlands Social relations in leisure and work settings
may provide opportunities for joining OCGs
throughout individuals’ lives
188
T. Comunale et al.
Systematic Review of the Social, Psychological and Economic Factors Relating…
189
Table 4 Categories of socio-economic and psychological factors associated with recruitment into
OCGs and number of studies reporting on factor categories (n = 184)
Category of factors
Age
Gender
Ethnicity
Educational
background
Employment
Economic conditions
Social ties
Group identity
Psychological factors
Criminal background
and skills
Silence/Omertà
Explanation of included factors
Factors on the age at which individuals are likely to be
recruited into OCGs (e.g. youngsters)
Factors on the differences between genders in being involved
in OCGs (e.g. majority of OCGs members are males)
Factors on the ethnic features of OCGs members (e.g. ethnic
homogeneity)
Factors on the level of education of individuals recruited by
OCGs (e.g. illiteracy)
Factors on the how the lack of employment or the presence
of specific work settings can be facilitators for joining OCGs
(e.g. employees of logistic companies)
Factors on how certain economic conditions can facilitate
recruitment into OCGs (e.g. poverty)
Factors on the relations that provide opportunities for being
involved in OCGs (e.g. family ties)
Factors on the values and subculture shared by OCGs
members
(e.g. honor)
Factors on disorders related to the recruitment into OCGs
(e.g. being antisocial)
Factors on how previous criminal records, specific skills and
attitudes can increase the opportunities to enter OCGs
(e.g. risk-taking behaviors)
Factors on the ability of enforcing the code of silence for
being part of OCGs
N. of
factors
17
12
13
7
20
19
38
18
6
35
9
Notwithstanding the differences among the included studies, each of them
reported on the social, psychological, and/or economic factors associated with
recruitment of individuals to OCGs. After carefully reading all the studies, the
research team created categories of factors to organize the relevant information and
systematize the knowledge on this field of study. The total number of factors identified across the 47 included studies is 184. The identification of factors in each study
and their systematization into 11 categories allows analyzing how many times they
are reported. The recurring factors are those related to social ties and criminal background and skills, which respectively appear 38 and 35 times throughout the
included studies (Table 4).
Figure 2 highlights the different methodological approaches adopted by the studies reporting on each category of factors. As already underlined, the qualitative
approach seems to fit better the study of the factors relating to recruitment into OCGs.
190
T. Comunale et al.
Age
8
Gender
Ethnicity
Employment
6
2
3
5
5
Social ties
1
8
1
Economic conditions
3
4
4
4
Educational background
Group identity
6
4
14
4
7
27
1
17
Psychological factors
4
Criminal background and skills
4
2
6
25
Silence/Omertà
8
0%
10% 20% 30% 40% 50% 60% 70% 80% 90% 100%
Quantitative
Qualitative
Mixed-methods
Source: authors’ elaboration of the studies included in this systematic review.
Fig. 2 Factor categories per type of study (n = 184). (Source: authors’ elaboration of the studies
included in this systematic review.)
ocial, Psychological, and Economic Factors Relating
S
to Recruitment to Organized Crime Groups
Age
The reported age-groups of individuals involved into OC include both youngsters
(Arlacchi 1983; Arsovska 2015; Behan 1996; Blokland et al. 2017; Carvalho and
Soares 2016; Ciconte 1992; Cressey 1969; Hixon 2010; Kirby et al. 2016; Ostrosky
et al. 2012) and adults (Blokland et al. 2017; Kissner and Pyrooz 2009; Kleemans
and de Poot 2008; Salinas et al. 2011; Salinas and Regadera 2016; Unlu and Ekici
2012; Van Koppen et al. 2010b). Vulnerable young people join OCGs during adolescence and early adulthood. They are attracted by lifestyles dominated by the cult
of violence and by the show off of material goods (Behan 1996; Hixon 2010;
Ostrosky et al. 2012). The risk of recruitment at younger ages is also positively
associated with problems at school, drug use, low socio-economic conditions, and
the feeling of disillusion for the future (Arsovska 2015; Behan 1996; Carvalho and
Soares 2016). As a result, OC offenders are significantly younger than general
offenders in terms of age at first sanction (Kirby et al. 2016). The perspective of
profits, instead, primarily attracts adults. Social connections and skills acquired
with age facilitate their engagement in OC (Blokland et al. 2017; Kleemans and de
Poot 2008). These two age-groups emerge across the different types of OGCs, with
only few exceptions – outlaw motorcycle gangs specifically restrict membership to
adults (Blokland et al. 2017).
Systematic Review of the Social, Psychological and Economic Factors Relating…
191
Gender
The male population prevails across all the different types of OCGs (Brotherton and
Barrios 2004; Hixon 2010; Kirby et al. 2016; Salinas et al. 2011; Unlu and Ekici
2012; Varese 2011a, 2013). The rate of OC male offenders is even higher compared
with the population of general offenders (Salinas et al. 2011). The participation of
women occurs at lower rates mainly through family or emotional ties, especially
within DTOs (Brotherton and Barrios 2004; Requena et al. 2014; Salinas and
Regadera 2016; Van San and Sikkens 2017; Varese 2011a). Their role varies across
types of OCGs, and may change from home country to new territories.
Ethnicity
Criminological theories of strain, social disorganization, and subcultures developed
over the last century examined ethnic differences in offending and crime patterns.9
In line with these theories, ethnic marginality has been found to be associated with
involvement in OC. OCG membership help individuals to overcome the marginalization of their ethnic minority status (Arsovska 2015; Gordon 2000). Marginalization
can also help explaining the involvement in OC of illegal immigrants, whose irregular situation prevent them from finding a legitimate job (Salinas and Regadera
2016). Moreover, some ethnic groups are exposed to a higher risk of joining certain
types of OCGs, e.g. black individuals in drug-trafficking gangs (Carvalho and
Soares 2016).
Ethnic homogeneity proved to be relevant for most types of OCGs (Albini 1971;
Ciconte 1992; Cressey 1969; Decker and Chapman 2008; Hess 1993; Lupo 1993;
Varese 2011b, 2013; Wang 2013; Zhang and Chin 2002). Ethnic ties favor mutual
trust relations, which play a major role in OCGs due to the illicit nature of the activities and the risk of detection and arrest for their members (Decker and Chapman
2008; Zhang and Chin 2002). Ethnic homogeneity not only has favoured the establishment of OCGs within their territory of origin (Arlacchi 1983; Behan 1996;
Brancaccio 2017; Ciconte 1992; Gambetta 1993; Hess 1993), but has also contributed to their expansion across countries. With this regard, the literature reports on
Italian mafias in the U.S. and Germany, Russian mafias in Italy, and maras (i.e.
Central American street gangs) and Chinese triads in the U.S. (Albini 1971; Cressey
1969; Miguel Cruz 2010; Sciarrone and Storti 2014; Varese 2011a, 2013; Zhang and
Chin 2002).
Criminological theory states that ethnic heterogeneity coupled with low economic status, residential mobility, and family disruption lead to increases in crime rates among neighborhoods (Shaw
and McKay 1972). Subcultural theories explain crime involvement among lower-class individuals
belonging to ethnic minorities as a result of frustration and/or reaction to the dominant culture
(Cloward and Ohlin 1960; Cohen 1955; Miller 1958).
9
192
T. Comunale et al.
Educational Background
Low education levels are positively associated with individuals’ recruitment into
OCGs (Albini 1971; Carvalho and Soares 2016; Ciconte 1992; Hess 1993; Sales
2015). In the case of mafias, illiteracy does not prevent members from having a long
criminal career, becoming bosses and reaching wealth and status (Hess 1993).
However, mafia members’ educational levels may have increased over time
(Arlacchi 1983). While in the past mafia members were mainly illiterate and lower
class individuals, since the 1960s mafiosi include literate middle class individuals
(Arlacchi 1983). Nevertheless, the growth in mafia members’ education levels may
simply reflect the general increased education in the overall population during the
same period (Roser and Ortiz-Ospina 2017).
Employment
The lack of legitimate occupations and unemployment facilitates the involvement
into OCGs (Brancaccio 2017; Ciconte 1992; Gambetta 1993; Jhi and Gerber 2015;
Sales 2015; Wang 2013). A study has found the probability of becoming a gang
member almost three times lower for individuals with employment experience than
for those who have always been unemployed (Jhi and Gerber 2015). However, some
strategic occupations may also offer opportunities for criminal behaviour (Ciconte
1992; Kleemans and de Poot 2008; Kleemans and Van de Bunt 2008; Salinas et al.
2011; Van Koppen 2013). These occupations share some characteristics, as a certain
degree of independence to employees, the social exchange, and the relation with
mobility and logistics. Workers of the transport industry, especially truck drivers,
owners of car companies, and car dealers are attractive for OCGs (Kleemans and de
Poot 2008; Kleemans and Van de Bunt 2008; Van Koppen 2013). In these cases, licit
employments can conceal illicit activities, and illicit activities in turn can complement the legal salaries (Salinas et al. 2011).
Economic Conditions
Growing in poor city suburbs and socio-economically deprived environments facilitates recruitment into OCGs (Brotherton and Barrios 2004; Carvalho and Soares
2016; Ciconte 1992; Decker and Chapman 2008; Gordon 2000; Jhi and Gerber
2015; Sergi 2016; Van San and Sikkens 2017). Individuals from low socio-­economic
status may drop out of school to contribute to the family expenses and to improve
their living conditions. In such contexts, criminal activities may be attractive as a
way to pursue material and emotional reward (Gordon 2000; Ostrosky et al. 2012).
A career into Italian mafias, for example, fascinate many youngsters living in suburbs characterised by lack of money, goods, or means of support, contributing to
their continuous recruitment (Albini 1971; Arsovska 2015; Behan 1996; Brancaccio
2017; Hess 1993; Sales 2015). Nevertheless, individuals from higher socio-­
Systematic Review of the Social, Psychological and Economic Factors Relating…
193
economic conditions can also join OCGs, mainly attracted by high monetary gain
(Gordon 2000; Unlu and Ekici 2012; Van Koppen 2013; Wang 2013). This could be
a factor facilitating recruitment of individuals facing debts, specific needs (e.g. drug
addiction), or difficult life events (e.g. sudden illness) (Van Koppen 2013).
Social Ties
Social relations facilitate the involvement into criminal activities among the different types of OCGs (McIllwain 1999). Social relations may be developed in disparate spheres of everyday life (e.g. leisure and work ties), and later become a bridge
to OC (Decker and Chapman 2008; Gambetta 1993; Gordon 2000; Kleemans and
de Poot 2008; Kleemans and Van de Bunt 2008; Morselli 2003; Paoli 2003; Sales
2015; Van Koppen 2013; Van San and Sikkens 2017; Varese 2001, 2011b, 2013;
Wang 2013). This mechanism has been defined as “social opportunity structure”
(Kleemans and de Poot 2008). Individuals may join criminal settings because of
their experience and expert knowledge, and/or their ability to connect criminal
members with third parties, other criminal groups or representatives of the legal
businesses (Morselli 2003; Varese 2011a). Work, social, and criminal ties are therefore interwoven. Leisure activities and sidelines often act as a bridge between representatives of the legal and criminal settings (Kleemans and de Poot 2008;
Kleemans and Van de Bunt 2008; Van Koppen 2013). The social opportunity structure may explain why some individuals get involved into OCGs during adulthood:
their relational network enables their expertise to match a specific criminal opportunity. Moreover, individuals’ attitude towards criminal opportunities may loosen due
to improvise life events (e.g., bankruptcy) (Kleemans and de Poot 2008; Van
Koppen 2013).
Kinship and blood ties are facilitators to access OCGs (Arlacchi 1983; Arsovska
2015; Behan 1996; Brancaccio 2017; Ciconte 1992; Cressey 1969; Decker and
Chapman 2008; Gambetta 1993; Kissner and Pyrooz 2009; Lo 2010; Requena et al.
2014; Salinas et al. 2011; Salinas and Regadera 2016; Sciarrone 2014; Sergi 2016;
Van Koppen 2013; Varese 2001, 2006, 2011a). The key role of kinship and blood
ties in the recruitment into OCGs results from the need of cultural transmission and
gradual learning of criminal culture and knowledge to new members (Gordon 2000;
Sergi 2016). Family members and close friends are easier to trust in the criminal
environment lacking third parties to regulate businesses and disputes (Van Koppen
2013). Being part of a criminal family may per se facilitate one’s recruitment into
OCGs, especially in the mafias (Albini 1971; Arlacchi 1983; Ciconte 1992;
Gambetta 1993; Hess 1993; Lupo 1993; Paoli 2003; Sciarrone 2014; Sergi 2016).
In the mafias, the concept of family goes beyond proper kinship and blood ties.
Individuals can assume a permanent new identity as “men of honor” in OCGs
through the acceptance of a “status contract”, through their affiliation ceremony
(which in some Italian mafias is called “baptism”). During this ceremony, several
rituals help creating brotherhood ties among members, thus also enabling “contract
of fraternization”. This contract extends the family bonds of loyalty and obligation,
194
T. Comunale et al.
providing members with the mutual support and trust necessary to pursue groups’
aims (Paoli 2003). Family ties play a significant role also for gangs, in which parental gang membership has been proven to be a significant predictor of individuals’
affiliation (Kissner and Pyrooz 2009).
Group Identity
The sense of belonging and social identity associated with the membership into a
criminal group facilitates the recruitment into OCGs (Arsovska 2015; Brotherton
and Barrios 2004; Densley 2012; García 2006; Hixon 2010; May 2009). Co-offending
and social interactions within the OCGs reinforce the sense of loyalty and social
cohesion among members (Densley 2012). These processes enhance members’
sense of group identity (García 2006). Moreover, individuals joining OCGs in many
cases belong to subcultures characterized by values of honor and loyalty, and are
often recruited through ritualized procedures of affiliation (Albini 1971; Arlacchi
1983; Brotherton and Barrios 2004; Cressey 1969; Gambetta 1993; Hess 1993;
Hixon 2010; Lo 2010; Paoli 2003; Sciarrone 2014; Sergi 2016; Zhang and Chin
2002). This is particularly relevant in the case of mafias, in which the initiation ceremonies play a key role (Albini 1971; Gambetta 1993; Hess 1993; Hixon 2010;
Paoli 2003; Sergi 2016). To be recruited into the mafias, individuals must have psychic attitudes and a moral code typical of “men of honor”, who are respected and
capable of violent revenge if necessary (Gambetta 1993; Hess 1993). During the
initiation ceremonies, the new members have to take an oath of “providing for the
family of a member in the event of his death or incarceration” (Albini 1971,
pp. 113–114; see also Paoli 2003; Sergi 2016).
Psychological Factors
Some studies associate substance use disorder, childhood conduct disorder, and/or
abnormal psychopathological traits to an increase of individuals’ risk of involvement in OC activities (Hixon 2010; Kissner and Pyrooz 2009; May 2009; Ostrosky
et al. 2012; Schimmenti et al. 2014; Sergi 2016). Individuals recruited into OCGs
usually have an extensive history of negative and arrested development during adolescence, leading to antisocial personality disorders during their adulthood
(Hixon 2010).
A medium–high psychopathy level is common among most OC members, in line
with their criminal skills. OC offenders lack empathy and inhibition, they have
marked cruelty and callousness, affective impairments, and an average antisocial
lifestyle. Such profiles are compatible with violent and risky activities, and committing physical assaults for immediate gratification, regardless of potential prosecution (Ostrosky et al. 2012). Another study confirmed the psychopathy and antisocial
traits characterizing mafias’ members, also underlying their infantile and dependent
personality traits, demonstrated by their obedience to the willingness of their orga-
Systematic Review of the Social, Psychological and Economic Factors Relating…
195
nizations. Mafia members differ from other offenders in that they do not suffer from
substance use disorder. Substance use may indeed impair the reliability of mafia
members, who always have to display the honorable principles of their organizations (Schimmenti et al. 2014).
Nevertheless, criminals involved in “high-profile” activities, like money-­
laundering, present different characteristics. These individuals maintain quite a normal lifestyle, but they lack affective bonds, they have increased arrogance,
callousness, and a strong desire for recognition and for a certain economic status.
These features allow them to achieve their goals through unethical and illicit nonviolent activities (Ostrosky et al. 2012).
Criminal Background and Skills
Attitudes towards violent and risk-taking behaviors are essential to be part of
OCGs. Violence is key to reinforce the criminal status of members, obtaining the
respect and social acceptance of their group (Albini 1971; Behan 1996).
Consequently, people with a criminal background are more likely to become
involved in OCGs (Albini 1971; Arlacchi 1983; Behan 1996; Blokland et al. 2017;
Brancaccio 2017; Gambetta 1993; Hess 1993; Kirby et al. 2016; Requena et al.
2014). In many cases OC members have a long criminal history (Albini 1971;
Arsovska 2015; Blokland et al. 2017; Brancaccio 2017; Cressey 1969; Decker
and Chapman 2008; Densley 2012; Gambetta 1993; Kirby et al. 2016; Kleemans
and de Poot 2008; Lupo 1993; Morselli 2003; Sales 2015; Salinas et al. 2011; Van
Koppen et al. 2010a, b; Varese 2011b). Compared to the population of general
offenders, OC offenders show higher rates of offending seriousness, and serve
longer time in prison (Van Koppen et al. 2010a). The key role of the cult of violence also explains the positive association between prison background and
recruitment into OCGs, as individuals seek for protection and personal safety
within the penitentiary (Behan 1996; Ciconte 1992).
The possession of criminal skills or special expertise is another relevant feature for recruitment into OCGs. The former refers to the ability of avoiding
police detection and allows OCGs to test the loyalty and criminal potential of
individuals (Densley 2012). The latter refers to high levels of knowledge, or the
right set of skills, making individuals suited for certain types of illegal businesses. In some cases, the special expertise required can be very specific, as for
translators, people capable of handling explosives, or people with a chemistry
background supporting drug-related operations (Gambetta 1993). Such special
expertise can derive from criminal or legitimate experience (Van Koppen 2013;
Salinas and Regadera 2016). In both cases, having a special expertise explains
the involvement in OCGs during adulthood (Kleemans and de Poot 2008).
Individuals with specific criminal expertise acquired through their criminal
career may be recruited in prison (Behan 1996; Ciconte 1992) or outside
(Arlacchi 1983; Cressey 1969; Gambetta 1993; Lo 2010; Salinas et al. 2011;
Salinas and Regadera 2016; Sergi 2016; Van Koppen 2013).
196
T. Comunale et al.
Silence/Omertà
Individuals joining OCGs cannot break the code of silence, also known as omertà,
required to commit OC activities (Albini 1971; Ciconte 1992; Cressey 1969;
Gambetta 1993; Hess 1993; Lo 2010; Lupo 1993; Paoli 2003; Requena et al. 2014).
For mafia members, handling secrecy also implies the impossibility to have contacts
or any relationships with legal authorities. Albini (1971, pp. 107–108) underlines
that “omertà is not unique to any one organization or society. Omertà is a behavior
and attitude [and] […] it represents suspicion and resentment of government
and law”.
Discussion
This systematic review includes 47 studies published over a span of nearly fifty
years (1969–2017). Results show that the majority of the studies employs qualitative methods and cover the entire period, though quantitative research has recently
increased. Compared to the previous decade (i.e. 2000–2009), literature on recruitment into OCGs has risen by almost 108%, with 27 included studies published since
2010. The growth has encompassed all type of studies, but the most notable increase
has involved the use of quantitative methods (from 2 studies during 2000–2009 to
10 since 2010).
As for the geographic scope, the recent rising trend has mostly occurred in
Europe. Of the total number of included studies, almost 40% (n = 18) investigate
recruitment into OCGs in the European context and were published on or after
2010. Italy is the most represented country, though academic studies on the
Netherlands and Spain have also emerged over the last two decades. After Europe,
the most represented continent is North America, followed by a small number of
comparative research studies (e.g. OC in the U.S. and China).
Results therefore show that literature focuses on Europe rather than the Americas,
Russia, and Far East, other geographic areas also affected by the presence of OCGs.
This finding suggests that the interest in OC-related activities is prevalent in some
countries, while in others there seems to be less attention despite a long tradition in
criminological research (e.g. the U.S.). Nonetheless, the advancement of quantitative research in the study of OC may change this scenario, fostering the interest of
more scholars. Further quantitative studies in under-represented countries would
contribute to enhance the knowledge on risk factors for involvement into OCGs.
Research findings show that factors associated with recruitment into OCGs are
highly interrelated. Social and economic factors play a major role while psychological
factors are found to be less important. This finding is in line with the literature on the
social opportunity structure (Kleemans and De Poot 2008) as the underlying mechanism
through which recruitment into OCGs occurs. Opportunities to enter OCGs depend on
individuals’ personal background and skills, as well as on the social relations they
develop in different settings of their lives. Previous studies indeed consistently highlight
Systematic Review of the Social, Psychological and Economic Factors Relating…
197
the importance of factors as violent attitudes and behavior, criminal background, low
economic status, and social relations in facilitating individuals’ involvement into
OC. Members of OCGs usually have a significant criminal history and/or a prison background resulting from their proneness to violent and risk-taking behavior. This is particularly true for people living in poor and socially disorganized areas. The lack of access
to legitimate means to attain commonly accepted goals may make them more prone to
seek illegal alternatives to overcome difficulties. In this perspective emerges the social
embeddedness of OC. Recruitment in OCGs mainly revolves on social proximity and
interaction with members of criminal organizations. Although relations developed in
work settings and everyday activities are important in recruiting new members, kinship
and blood ties with OC offenders allow for increased mutual trust and loyalty.
Though social, psychological, and economic factors are highly interrelated concerning criminal recruitment, some are equally present across various types of
OCGs, while others are particularly relevant for some of them. Kinship and blood
ties are particularly important in recruiting mafia members. Furthermore, these
groups succeed in extending the family concept beyond proper kinship and blood
ties. Through the initiation ritual, individuals accept the “contract of fraternization”
enhancing brotherhood ties among members, and increasing the cohesion of the
criminal organizations and reinforces group identity. This latter aspect is a key factor also for gang membership. Rituals and a common culture provide individuals
with a sense of belonging that favors their involvement in gangs. Conversely, individuals usually join DTOs mainly driven by monetary returns. Finally, individuals
get involved in other criminal organizations during adulthood as they develop specialized expertise and social ties with criminals only later in life.
The identification of a broad variety of factors on recruitment into OCGs benefits
from studies adopting different methodological approaches. Included studies are consistent in pointing to the same factors, regardless of their quantitative, qualitative, or
mixed-methods approach. Nonetheless, each approach better suits the analysis of specific factors. For instance, while quantitative studies usually report on age, gender, and
economic conditions, qualitative research often deals with factors that can hardly be
quantified, as group identity and silence/omertà (Fig. 2). Relevant grey literature further corroborates the consistency of the results. Selected reports identify the same
factors emerging from the review on empirical studies on the Italian mafias operating
in their territory of origin, as well as on foreign mafias operating in other geographic
areas. However, the inclusion of studies adopting d­ ifferent methodological approaches
(Fig. 1), as well as the heterogeneity of the concept of OC, may limit the generalizability of research results beyond the OCG and the geographic area under analysis in
each study. On the one hand, the main limitations of included qualitative studies relate
to their research designs. Many of them rely on case studies, thus lacking external
validity. Alternatively, they are monographies focusing on the mafias in their territories of origin. On the other hand, the main limitation of quantitative and mixed-methods studies lies in their data sources. They mostly rely on investigative and judicial
data, thus referring to non-random samples that suffer from the “dark number” issue
(i.e. the discrepancy between the number of real events and the reported offences and
offenders). Notwithstanding the methodological approach, the limited generalizabil-
198
T. Comunale et al.
ity of the results may be due to the heterogeneity of the concept of OC. Given the lack
of a unique definition of OC, the literature in this field of study encompasses varying
regions and criminal organizations. The adoption of a broad definition of OC (i.e. by
identifying four types of OCGs) allows providing a general overview of the factors
relating to recruitment into OC, although results should be interpreted with caution
when considering other types of OCGs. Nonetheless, the results of this systematic
review provide a systematized and comprehensive understanding on the factors facilitating pathways into OC, while also pointing out relatively under-examined factors for
future studies. Finally, research findings contribute to consolidate the knowledge in
this field and may serve to inform the policy-making process aimed at preventing
involvement into OC.
Conclusions
This study is the first systematic review shedding light on the most commonly
reported social, psychological, and economic factors associated with involvement
into OC. The extensive and rigorous search – performed in multiple languages and
several databases – has allowed identifying and assessing potentially eligible
records while also reducing the risk of bias in the inclusion of relevant literature.
The systematic review includes 47 studies, of which the majority are qualitative
(57%), followed by quantitative studies (26%) and mixed-methods ones (17%). The
literature includes different types of OCGs – among all Italian mafias (40% of the
studies) and other criminal organizations (30%) – with official statistics, investigative and judicial files as the main source of data.
Research findings highlight that social and economic factors play a major role for
involvement into OC. Individuals’ recruitment into OCGs is influenced, among all, by
low socio-economic status, attraction for a strong group identity, and social ties. Social
connections and work-related ties drive the recruitment of late-onset offenders, who
get involved into OC because of criminal opportunities, which may arise at later stages
in life. Financial gains are also found to be important, especially for individuals who
join DTOs. An existing criminal background or possession special expertise constitute
a positive driver for involvement into OC, although some OCGs as the mafias require
peculiar skills as the ability of handling secrecy and enforce the code of silence.
As for limitations, the research design adopted by qualitative and mixed-­methods
approaches might mitigate generalizability of findings to other OCGs or other geographic areas. Nonetheless, this study provides a more comprehensive understanding on factors associated with involvement in OC and contributes to the consolidation
of such knowledge also providing insights on the empirical evidence by geographic
areas and types of literature included (i.e. types of methods and data sources). In
addition, the heterogeneity of the concept of OC has made it difficult to perform a
meta-analysis to properly combine and analyze the results from multiple quantitative studies. Despite these limitations, this systematic review is the first study to
synthesize the empirical evidence on factors related to recruitment into OCGs.
Systematic Review of the Social, Psychological and Economic Factors Relating…
199
Future studies may expand and improve this review under some aspects. One of
the main implications for future research regards the methodological approach in
the study of recruitment into OC. If the recently emerged quantitative approach proliferates, results of future studies will have an increased external validity. Quantitative
research will also allow the development and testing of hypotheses and therefore the
empirical test of theoretical contributions in the field of OC. In addition, further
quantitative research will allow further enhancing the empirical evidence on risk
factors for involvement into OC and comparing such dynamics with general or less
serious crimes. These improvements could be feasible provided the exchange of
data and information among law enforcement agencies, scholars, and policy-­
makers. Increasing publication of quantitative studies would also facilitate the comparison of results across different types of OCGs and regions. Future studies may
adopt different scopes, focusing on different types of OCGs or on OCGs active in
specific geographic areas that are currently underrepresented (e.g. Asian or African
countries). Overall, scholars should focus on factors relating to recruitment into
OCGs with more detail and more comprehensively. They may therefore focus on
both those factors emerging as crucial (e.g. individuals’ criminal background and
social relations) and others that are currently underreported (e.g. psychological factors as personality traits).
These improvements would positively influence future OC research as well as
practitioners and policy-makers’ work. Extensive and systematic knowledge of the
factors relating to recruitment into OCGs would allow institutions to tackle this
continuous process. The analysis identification of individual red flags combined
with the assessment of risky social environments would facilitate the design of tailored policies aimed at preventing recruitment into OCGs. The limited generalizability of the research findings prevents the identification of specific recommendations
for crime prevention policies. Nonetheless, the results of this systematic review can
inform future policy-making processes enhanced by further empirical research on
OC and involvement into OCGs.
References
Studies Included in the Systematic Review
Albini, J. L. (1971). The American mafia: Genesis of a legend. New York: Appleton-Century-Crofts.
Arlacchi, P. (1983). La mafia imprenditrice. Bologna: Il Mulino.
Arsovska, J. (2015). Decoding Albanian organized crime: Culture, politics, and globalization.
Oakland: University of California Press.
Behan, T. (1996). The camorra. London: Routledge.
Blokland, A., van Hout, L., van der Leest, W., & Soudijn, M. (2017). Not your average biker;
criminal careers of members of Dutch outlaw motorcycle gangs. Trends in Organized Crime.,
22, 10–33. https://doi.org/10.1007/s12117-017-9303-x.
Brancaccio, L. (2017). I clan di camorra: genesi e storia. Roma: Donzelli Editore.
200
T. Comunale et al.
Brotherton, D., & Barrios, L. (2004). The almighty Latin King and Queen Nation: Street politics
and the transformation of a New York City gang. New York/Chichester: Columbia University
Press.
Carvalho, L. S., & Soares, R. R. (2016). Living on the edge: Youth entry, career and exit in
drug-selling gangs. Journal of Economic Behavior & Organization, 121, 77–98. https://doi.
org/10.1016/j.jebo.2015.10.018.
Ciconte, E. (1992). “Ndrangheta dall”unità a oggi. Bari: Editori Laterza.
Cloward, R., & Ohlin, L. (1960). Delinquency and Opportunity. New York: The Free Press.
Cressey, D. R. (1969). Theft of the nation: The structure and operations of organized crime in
America. New Brunswick/London: Transaction Publishers.
Cohen, A. K. (1955). Delinquent Boys: The Culture of the Gang. Glencoe, IL: Free Press.
Decker, S. H., & Chapman, M. T. (2008). Roles, recruitment into, and remaining involved in
the drug smuggling trade. In Drug smugglers on drug smuggling: Lessons from the inside
(pp. 88–113). Philadelphia: Temple University Press.
Densley, J. A. (2012). Street gang recruitment: Signaling, screening, and selection. Social
Problems, 59(3), 301–321. https://doi.org/10.1525/sp.2012.59.3.301.
Gambetta, D. (1993). The Sicilian mafia: The business of private protection. Cambridge, MA:
Harvard University Press.
García, M. M. (2006). “Narcoballads”: The psychology and recruitment process of the “Narco.”.
Global Crime, 7(2), 200–213. https://doi.org/10.1080/17440570601014461.
Gordon, R. M. (2000). Criminal business organizations, street gangs and wanna-be groups: A
Vancouver perspective. Canadian Journal of Criminology, 42, 39–60.
Hess, H. (1993). Mafia: Le origini e la struttura. Roma-Bari: Editori Laterza.
Hixon, S. J. (2010). Archetypal perspectives on Nordic and Germanic initiation symbols, mythology, and rites of passage in a European American self-referenced White supremacist gang (PhD
dissertation, Saybrook University). Ann Arbor: ProQuest/UMI (Publication No. 3418929).
Jhi, K. Y., & Gerber, J. (2015). Texan gangs in “Da Hood:” The impact of actual and perceptual
neighborhood qualities on gang membership. Justice Policy Journal, 12, 1–25.
Kirby, S., Francis, B., Humphreys, L., & Soothill, K. (2016). Using the UK general offender database as a means to measure and analyse organized crime. Policing: An International Journal,
39(1), 78–94. https://doi.org/10.1108/PIJPSM-03-2015-0024.
Kissner, J., & Pyrooz, D. C. (2009). Self-control, differential association, and gang membership:
A theoretical and empirical extension of the literature. Journal of Criminal Justice, 37(5), 478–
487. https://doi.org/10.1016/j.jcrimjus.2009.07.008.
Kleemans, E. R., & de Poot, C. J. (2008). Criminal careers in organized crime and social
opportunity structure. European Journal of Criminology, 5(1), 69–98. https://doi.
org/10.1177/1477370807084225.
Kleemans, E. R., & Van de Bunt, H. G. (2008). Organised crime, occupations and opportunity.
Global Crime, 9(3), 185–197. https://doi.org/10.1080/17440570802254254.
Lo, W. T. (2010). Beyond social capital: Triad organized crime in Hong Kong and China. British
Journal of Criminology, 50(5), 851–872. https://doi.org/10.1093/bjc/azq022.
Lupo, S. (1993). Storia della mafia. Roma: Donzelli Editore.
May, C. (2009). The relationship between risk factors, social support and gangs (PhD dissertation,
Alliant International University). Ann Arbor: ProQuest/UMI (Publication No. 3421105).
McIllwain, J. S. (1999). Organized crime: A social network approach. Crime, Law and Social
Change, 32(4), 301–323. https://doi.org/10.1023/A:1008354713842.
Miguel Cruz, J. (2010). Central American maras: From youth street gangs to transnational protection rackets. Global Crime, 11(4), 379–398. https://doi.org/10.1080/17440572.2010.519518.
Miller, W. B. (1958). Lower Class Culture as a Generating Milieu of Gang Delinquency. Journal of
Social Issues, 14(3), 5–19. https://doi.org/10.1111/j.1540-4560.1958.tb01413.x.
Morselli, C. (2003). Career opportunities and network-based privileges in the Cosa Nostra. Crime,
Law and Social Change, 39(4), 383–418. https://doi.org/10.1023/A:1024020609694.
Systematic Review of the Social, Psychological and Economic Factors Relating…
201
Ostrosky, F., Borja, K. C., Rebollar, C. R., & Díaz, K. X. (2012). Neuropsychological profiles of
members of organized crime and drug-traffic organizations. Research and Reports in Forensic
Medical Science, 19–30. https://doi.org/10.2147/RRFMS.S32352.
Paoli, L. (2003). Mafia brotherhoods: Organized crime, Italian style. Oxford: Oxford University
Press.
Requena, L., de Juan, M., Salinas, A. G., & de la Corte, L. (2014). A psychosocial study on crime
and gender: Position, role and status of women in a sample of Spanish criminal organizations /
Un estudio psicosocial sobre la delincuencia y género. Posición, rol y estatus de la mujer en una
muestra española de organizaciones criminales. Revista de Psicología Social, 29(1), 121–149.
https://doi.org/10.1080/02134748.2013.878572.
Roser, M., & Ortiz-Ospina, E. (2017). Global Education. Published online at OurWorldInData.
org. Retrieved from: https://ourworldindata.org/global-rise-of-education [Online Resource]
Sales, I. (2015). Storia dell’Italia mafiosa: perché le mafie hanno avuto successo. Soveria
Mannelli: Rubbettino.
Salinas, A. G., & Regadera, S. F. (2016). Multiple affiliations in criminal organizations: Analysis
of a Spanish sample. Crime, Law and Social Change, 65(1–2), 47–65. https://doi.org/10.1007/
s10611-015-9597-z.
Salinas, A. G., Requena, L., & De la Corte, L. (2011). ¿Existe un perfil de delincuente organizado? Exploración a partir de una muestra española. Revista Electrónica de Ciencia Penal Y
Criminología, 13(3), 03:1–03:32.
Schimmenti, A., Caprì, C., La Barbera, D., & Caretti, V. (2014). Mafia and psychopathy. Criminal
Behaviour and Mental Health, 24(5), 321–331. https://doi.org/10.1002/cbm.1902.
Sciarrone, R. (2014). `Ndrangheta: A reticular organization. In N. Serenata (Ed.), The
`Ndrangheta and Sacra Corona Unita (Vol. 12, pp. 81–99). Cham: Springer. https://doi.
org/10.1007/978-3-319-04930-4_6.
Sciarrone, R., & Storti, L. (2014). The territorial expansion of mafia-type organized crime. The
case of the Italian mafia in Germany. Crime, Law and Social Change, 61(1), 37–60. https://doi.
org/10.1007/s10611-013-9473-7.
Sergi, A. (2016). A qualitative reading of the ecological (dis)organisation of criminal associations.
The case of the “Famiglia Basilischi” in Italy. Trends in Organized Crime, 19(2), 149–174.
https://doi.org/10.1007/s12117-015-9254-z.
Shaw, C. R., & McKay, H. D. (1972). Juvenile delinquency and urban areas. Chicago: University
of Chicago Press.
Unlu, A., & Ekici, B. (2012). The extent to which demographic characteristics determine international drug couriers’ profiles: A cross-sectional study in Istanbul. Trends in Organized Crime,
15(4), 296–312. https://doi.org/10.1007/s12117-012-9152-6.
Van Koppen, M. V. (2013). Involvement mechanisms for organized crime. Crime, Law and Social
Change, 59(1), 1–20. https://doi.org/10.1007/s10611-012-9396-8.
Van Koppen, M. V., de Poot, C. J., & Blokland, A. A. J. (2010a). Comparing criminal careers
of organized crime offenders and general offenders. European Journal of Criminology, 7(5),
356–374. https://doi.org/10.1177/1477370810373730.
Van Koppen, M. V., de Poot, C. J., Kleemans, E. R., & Nieuwbeerta, P. (2010b). Criminal trajectories in organized crime. British Journal of Criminology, 50(1), 102–123. https://doi.
org/10.1093/bjc/azp067.
Van San, M., & Sikkens, E. (2017). Families, lovers, and friends: Women, social networks, and
transnational cocaine smuggling from Curaçao and Peru. The Howard Journal of Crime and
Justice, 56(3), 343–357. https://doi.org/10.1111/hojo.12218.
Varese, F. (2001). The Russian mafia: Private protection in a new market economy. Oxford/New
York: OUP Oxford.
Varese, F. (2006). How mafias migrate: The case of the `Ndrangheta in northern Italy. Law &
Society Review, 40(2), 411–444. https://doi.org/10.1111/j.1540-5893.2006.00260.x.
Varese, F. (2011a). How mafias take advantage of globalization: The Russian mafia in Italy. British
Journal of Criminology, 52(2), 235–253. https://doi.org/10.1093/bjc/azr077.
202
T. Comunale et al.
Varese, F. (2011b). Mafias on the move: How organized crime conquers new territories. Princeton:
Princeton University Press.
Varese, F. (2013). The structure and the content of criminal connections: The Russian mafia in
Italy. European Sociological Review, 29(5), 899–909. https://doi.org/10.1093/esr/jcs067.
Wang, W. (2013). Conventional capital, criminal capital, and criminal careers in drug trafficking
(PhD dissertation, Arts and Social Sciences: School of Criminology). Burnaby, B.C.: Simon
Fraser University Library.
Zhang, S., & Chin, K.-L. (2002). Enter the dragon: Inside Chinese human smuggling organizations. Criminology, 40(4), 737–768. https://doi.org/10.1111/j.1745-9125.2002.tb00972.x.
Other References
Albini, J. L. (1971). The American mafia: Genesis of a legend. New York: Appleton-Century-Crofts.
Albrecht, H.-J., & Fijnaut, C. (Eds.). (2002). The containment of transnational organized crime:
comments on the UN convention of December 2000. Freiburg im Breisgau: Ed. iuscrim Max-­
Planck-­Inst. für Ausländisches und Internat. Strafrecht.
Bandiera, O. (2003). Land reform, the market for protection, and the origins of the Sicilian mafia:
Theory and evidence. Journal of Law, Economics, and Organization, 19(1), 218–244. https://
doi.org/10.1093/jleo/19.1.218.
Benzies, K. M., Premji, S., Hayden, K. A., & Serrett, K. (2006). State-of-the-evidence reviews:
Advantages and challenges of including grey literature. Worldviews on Evidence-Based
Nursing, 3(2), 55–61. https://doi.org/10.1111/j.1741-6787.2006.00051.x.
Blevins, K. R., Johnson Listwan, S., Cullen, F. T., & Lero Jonson, C. (2010). A general strain
theory of prison violence and misconduct: An integrated model of inmate behavior. Journal of
Contemporary Criminal Justice, 26(2), 148–166. https://doi.org/10.1177/1043986209359369.
Carvalho, L. S., & Soares, R. R. (2016). Living on the edge: Youth entry, career and exit in
drug-selling gangs. Journal of Economic Behavior & Organization, 121, 77–98. https://doi.
org/10.1016/j.jebo.2015.10.018.
Clapper, J. R. (2015). Statement for the record worldwide threat assessment of the U.S. IC
before the Senate Armed Services Committee. Washington: Office of the Director of National
Intelligence. Retrieved from https://www.dni.gov/files/documents/Unclassified_2015_ATA_
SFR_-_SASC_FINAL.pdf.
Cornish, D. B., & Clarke, R. V. (2002). Analyzing organized crime. In A. R. Piquero & S. G.
Tibbetts (Eds.), Rational choice and criminal behavior: Recent research and future challenges.
New York: Garland.
Cressey, D. R. (1969). Theft of the nation: The structure and operations of organized crime in
America. Transaction Publishers.
Critical Appraisal Skills Programme. (2017). CASP qualitative checklist. [online] Available at:
http://www.casp-uk.net/checklists Accessed: 11/10/2017.
Daniele, V. (2009). Organized crime and regional development. A review of the Italian case. Trends
in Organized Crime, 12(3–4), 211–234. https://doi.org/10.1007/s12117-009-9079-8.
Decker, S. H., & Pyrooz, D. C. (2014). Gangs another form of organized crime? In L. Paoli (Ed.),
Oxford handbook of organized crime. Oxford: Oxford University Press.
Dixon-Woods, M., Bonas, S., Booth, A., Jones, D. R., Miller, T., Sutton, A. J., et al. (2006). How
can systematic reviews incorporate qualitative research? A critical perspective. Qualitative
Research, 6(1), 27–44. https://doi.org/10.1177/1468794106058867.
Finckenauer, J. O. (2007). Mafia and organized crime: A beginner’s guide. Oxford: Oneworld
Publications.
Systematic Review of the Social, Psychological and Economic Factors Relating…
203
Fisher, H., Montgomery, P., & Gardner, F. (2008a). Cognitive-behavioural interventions for preventing youth gang involvement for children and young people. Campbell Systematic Reviews,
7, 1–35. https://doi.org/10.4073/csr.2008.7.
Fisher, H., Montgomery, P., & Gardner, F. (2008b). Opportunities provision for preventing youth
gang involvement for Children and Young People (7-16). Campbell Systematic Reviews, 8,
1–32. https://doi.org/10.4073/csr.2008.8.
Gambetta, D. (1993). The Sicilian mafia: The business of private protection. Harvard University
Press.
Hagan, F. E. (2015). Introduction to criminology: Theories, methods, and criminal behavior. Los
Angeles: SAGE Publications.
Hess, H. (1993). Mafia: Le origini e la struttura. Editori Laterza: Roma-Bari.
Higginson, A., Mazerolle, L., Benier, K. H., & Bedford, L. (2014). Predictors of youth gang
membership in low-and middle-income countries: A systematic review. Campbell Systematic
Reviews. Retrieved from https://campbellcollaboration.org/library/predictors-of-youth-gangmembership-low-and-middle-income-countries.html
Hodgkinson, J., Marshall, S., Berry, G., Newman, M., Reynolds, P., Burton, E., et al. (2009).
Reducing gang related crime: A systematic review of ‘comprehensive’ interventions. Technical
report. In Research evidence in education library. London: EPPI-Centre, Social Science
Research Unit, Institute of Education, University of London.
Ianni, F. A. J. (1974). Black mafia: Ethnic succession in organized crime (1st ed.). New York:
Simon & Schuster.
Jones, O. D., Wagner, A. D., Faigman, D. L., & Raichle, M. E. (2013). Neuroscientists in court.
Nature Reviews Neuroscience, 14(10), 730–736. https://doi.org/10.1038/nrn3585.
Kleemans, E. R., & De Poot, C. J. (2008b). Criminal careers in organized crime and social
opportunity structure. European Journal of Criminology, 5(1), 69–98. https://doi.
org/10.1177/1477370807084225.
Kleemans, E. R., & Van de Bunt, H. G. (1999). The social embeddedness of organized crime.
Transnational Organized Crime, 5(1), 19–36.
Kleemans, E. R., & Van de Bunt, H. G. (2008). Organised crime, occupations and opportunity.
Global Crime, 9(3), 185–197. https://doi.org/10.1080/17440570802254254.
Kleemans, E. R., & Van Koppen, M. V. (2014). Careers in organized crime. In G. Bruinsma
& D. Weisburd (Eds.), Encyclopedia of criminology and criminal justice (pp. 285–295).
New York: Springer.
Klein, M. W., & Maxson, C. L. (2006). Street gang patterns and policies. New York: Oxford
University Press.
Knox, J., & Gray, D. H. (2014). The national and international threat of drug trafficking organizations. Global Security Studies, 5(3), 27–34.
Langston, M. (2003). Addressing the need for a uniform definition of gang-involved crime. FBI
Law Enforcement Bulletin, 72, 7.
Lavezzi, A. M. (2008). Economic structure and vulnerability to organised crime: Evidence from
Sicily. Global Crime, 9(3), 198–220. https://doi.org/10.1080/17440570802254312.
Lavezzi, A. M. (2014). Organised crime and the economy: A framework for policy prescriptions.
Global Crime, 15(1–2), 164–190. https://doi.org/10.1080/17440572.2013.868626.
Murray, J., Farrington, D. P., & Eisner, M. P. (2009). Drawing conclusions about causes from
systematic reviews of risk factors: The Cambridge Quality Checklists. Journal of Experimental
Criminology, 5(1), 1–23. https://doi.org/10.1007/s11292-008-9066-0.
Ostrosky, F., Borja, K. C., Rebollar, C. R., & Díaz, K. X. (2012). Neuropsychological profiles of
members of organized crime and drug-traffic organizations. Research and Reports in Forensic
Medical Science, 19–30. https://doi.org/10.2147/RRFMS.S32352.
Paoli, L. (2014a). Organized crime, types of. In G. Bruinsma & D. Weisburd (Eds.), Encyclopedia
of criminology and criminal justice (pp. 3376–3387). New York: Springer.
Paoli, L. (2014b). The Italian mafia. In L. Paoli (Ed.), The Oxford handbook of organized crime
(pp. 121–141). New York: Oxford University Press.
204
T. Comunale et al.
U.S. Department of Justice. (2010). National drug threat assessment 2010 (National Drug
Intelligence Center). Retrieved from https://www.justice.gov/archive/ndic/pubs38/38661/
United Nations. (2000). Convention on transnational organized crime (No. Assembly Resolution
55/95 of 15 Nov 2000). Retrieved from http://www.unodc.org/unodc/treaties/CTOC/
Varese, F. (2010). Organized crime: Critical concepts in criminology. London/New York:
Routledge.
Walsh, A., & Beaver, K. M. (2009). Biosocial Criminology. In Handbook on crime and deviance.
New York: Springer.
Wood, J. L., Alleyne, E., Mozova, K., & James, M. (2014). Predicting involvement in prison gang
activity: Street gang membership, social and psychological factors. Law and Human Behavior,
38(3), 203–211. https://doi.org/10.1037/lhb0000053.
Socio-Economic Inequalities
and Organized Crime: An Empirical
Analysis
Michele Battisti, Giovanni Bernardo, Antri Konstantinidi,
Andros Kourtellos, and Andrea Mario Lavezzi
Introduction
In this chapter we contribute to the recent literature (e.g., Istat 2010; Acciari et al.
2017; Güell et al. 2017) that provides evidence that inequality is high and social
mobility is low in the Italian regions and provinces where organized crime is widespread such as those of Southern Italy. We complement this line of work in two
respects. First, using a novel panel dataset at the regional level for the period
1985–2014 we investigate the relationship between inequality and organized crime
at the regional level, exploiting both time and cross-sectional variation.1 Second, we
assess the role of social mobility in organized crime.
Our main hypothesis is that both inequality and intergenerational persistence
lead to organized crime. There exist various mechanisms for why income inequality
matters. In particular, direct channels may be at work, for example if poor individuals find organized crime attractive for lack of remunerative alternatives in the labor
market. Alternatively, rich individuals, for example members of the economic and
political élite, may demand organized crime “services” to gain or preserve their
Some previous work has studied the relationship between inequality and corruption (e.g., JongSung and Khagram 2005), violent crime (e.g. Fajnzylber et al. 2002) and civil conflict (e.g.,
Macours 2010).
1
M. Battisti · G. Bernardo · A. M. Lavezzi (*)
Department of Law, University of Palermo, Palermo, Italy
e-mail: mario.lavezzi@unipa.it
A. Konstantinidi
Department of Economics, University of Cyprus, Nicosia, Cyprus
Cyprus and Department of Law, University of Palermo, Palermo, Italy
A. Kourtellos
Department of Economics, University of Cyprus, Nicosia, Cyprus
© Springer Nature Switzerland AG 2020
D. Weisburd et al. (eds.), Understanding Recruitment to Organized Crime
and Terrorism, https://doi.org/10.1007/978-3-030-36639-1_9
205
206
M. Battisti et al.
socio-economic standing. Franchetti (1877) initially pointed out this behavior in his
thorough enquiry on Sicily at the time of reunification of Italy, as he noted that the
Sicilian upper class benefited from the protection services by the early mafiosi.
Recent evidence supporting this claim is found for example in Gambetta and Reuter
(1995), describing how entrepreneurs can gain monopolistic power by forming cartels enforced by criminal organizations in the adjudication of public contracts,2 and
by De Feo and De Luca (2017), who provide evidence on the support that Mafia can
give to local politicians in exchange for economic benefits. In addition, indirect
channels can also be at work. This occurs if the expected returns from organized
crime, including possible punishment and opportunity costs, are higher than the
expected return of the individuals’ legal alternatives. Our conjecture is that there
might be more gains from involvement in organized crime in the presence of
inequality as the latter is likely to lead to corruption and erosion of the rule of law
(Jong-Sung and Khagram 2005; Sunde et al. 2008).
In addition, we expect that low socio-economic mobility favors organized crime
development. This fact, as noted, is suggested by the empirical analyses of Acciari
et al. (2017), and Guell et al. (2017), although in these articles this issue is not considered. Our hypothesis is motivated by the ideas of memberships theory of inequality put forward by Durlauf (1996, 1999, 2006). Cross-sectional inequality leads to
segregation that generates gaps in the life-time outcomes of children that in turn
generate intergenerational immobility. Durlauf shows how the co-existence of social
interactions and residential segregation can lead to intergenerational persistence.
The idea is that in the presence of complementarity, parents (e.g., role models) will
make choices about the locations where their children grow up to affect their social
environment. This leads to neighborhood stratification by income and incentives for
segregation. Segregation in turn creates great gaps in the capabilities and outcomes
of children as they grow up to become adults. The higher the degree of segregation,
the larger are the gaps in human capital between children from rich and poor neighborhoods. This creates the Great Gatsby Curve (Durlauf and Seshadri 2018). More
precisely, assuming local public finance of education, rich families will sort themselves into rich and low-crime neighborhoods with high-quality schools and services. Poor families will sort themselves into high-crime neighborhoods with poor
schools and services. This implies that a child who grows up in a disadvantaged
neighborhood will receive poor education and it more likely to be exposed to a host
of negative social interaction effects such as the lack of exemplar role models and
negative peer effects that can influence educational and health outcomes or lead to
delinquent behavior. In contrast, favorite outcomes are expected for the human capital and skill formation of the children raised in rich neighborhoods. These gaps are
then transmitted from generation to generation giving rise to intergenerational
persistence.
Our hypothesis is that in such neighborhoods Mafiosi can represent relevant role
models, so that members of young generations have an incentive to fill the ranks of
See also Gambetta (1993) for an analysis of the Sicilian Mafia as a provider of private protection
and Lavezzi (2014) for a discussion of the concept of “demand for Mafia”.
2
Socio-Economic Inequalities and Organized Crime: An Empirical Analysis
207
criminal organizations. On the other hand, rich families tend to cluster to exploit
positive spillovers from other rich families. In connection with the argument we
made to motivate our hypothesis on the relationship between inequality and development of organized crime, we argue that in dynamic setting, offspring of rich families can have an incentive to exploit the same channels that members of previous
generations had to increase income and accumulate wealth, including the utilization
of the services provided by organized crime. Although our interest is on the causal
link going from social mobility to organized crime development, important feedback mechanisms can be at work, so that at this stage we cannot make strong claims
of causality and just look for robust correlations between measures of socio-­
economic mobility and of organized crime.3
Indeed, the few existing works investigating the relationship between organized
crime and social mobility study the causal link going from the former to the latter.
Coniglio et al. (2010) and Caglayan et al. (2017) in particular show that the presence
of organized crime within the territory interferes with human capital accumulation.
In particular, Coniglio et al. (2010) argue that the presence of organized crime in
Southern Italy, especially in the region of Calabria, hinders human capital accumulation by reducing incentives to invest in education and by increasing migration
outflows. Caglayan et al. (2017) instead provides empirical evidence of less accumulation of human capital in provinces of Northern Italy where the presence of
organized crime is widespread.4
In our empirical analysis we construct different measures of organized crime,
which are based on Calderoni (2011) and on dynamic factor methods (Moench et al.
2013; Bańbura and Modugno 2014). Furthermore, we use different inequality indices. Our main finding is that higher inequality leads to higher organized crime
development. The results are robust for different organized crime measures and
inequality indices. For all measures the ratio of 90th quintile over the 10th in the
distribution is a strong predictor of organized crime, even if we control for other
covariates that capture economic development, education, etc. We also find that
consumption inequality performs better that income inequality as the relevant
inequality measure. Finally, we conduct a provincial level analysis to study the
effect of socio-economic mobility on organized crime, using the Calderoni-based
indices. We consider three alternative measures of social mobility. We find that
lower socio-economic mobility displays a robust association with organized crime
development.
Work is in progress to analyze this issue in the city of Palermo.
Other works investigate the effect of other types of crime on social mobility. For example,
Savolainen et al. (2014), using birth cohort data from Finland, examine the relationship between
intergenerational educational mobility and criminal activity noting that rates of criminal offending
is strongly related to family background. Differently, Sharkey and Torrats-Espinosa (2017), using
longitudinal data on US, find evidence that a decline on violent crime in a county increases the
upward economic mobility in adults who had experienced this drop during the late adolescence.
Moreover, they show that a decline in the violent crime rate reduces the high school dropouts at the
county level.
3
4
208
M. Battisti et al.
This chapter is organized as follows. Section “Data” contains the description of
the dataset; Section “Methodology” describes the methodology employed for the
empirical analysis; Section “Results” presents the results; Section “Discussion”
contains a discussion of our results; Section “Conclusions” contains some concluding remarks.
Data
Our dataset on organized crime and inequality takes the form of an unbalanced
5-year period panel for 20 Italian regions for the period 1985–2014. A detailed
description of the data and our sources is in Table 1. While we construct the organized crime variables at the annual frequency we opt to use 5-period averages to
reduce measurement error bias and ease the problem of missing observations in
several explanatory variables.
Data on income inequality are obtained from the Survey on Household Income
and Wealth (SHIW) provided by the Bank of Italy, which comprises about 8000
households (20,000 individuals) per wave. This survey includes information on personal income, household consumption and wealth, education and occupation. Data
on socio-economic mobility are from Acciari et al. (2017), and come from Italian
tax data at provincial level.
Measures of Organized Crime
To measure organized crime, we follow the current literature and utilize data on
crimes committed by members of criminal organizations. Data on crimes come
from Istat and the SDI database, managed by the Italian Ministry of Interiors.5 Our
analysis distinguishes between two types of crime measures. Type I includes direct
measures, i.e. crimes that unambiguously are related to organized crime (2 crimes):
Homicide by Mafia and Mafia Type Association. Type II includes indirect measures,
i.e. crimes that are potentially associated to organized crime (14 crimes): Criminal
Association, Bribery, Corruption for an Act Against Official Duties, Drugs,
Extortion, Money Laundering, Prostitution, Smuggling, Threats, Usury, Corruption
in Public Acts, Instigation to Corrupt, Judicial Corruption, Kidnapping for Extortion
Purposes.6
Our organized crime measures are based on the joint consideration of type I and
II crimes. We choose to measure organized crime in this way as the relevance of
crimes of Type II is remarked in several reports on the activities of Italian mafias
We are grateful to Magg. Domenico Martinelli and to Claudia Di Persio for invaluable help, and
to the Department on “Analisi Criminale della Direzione Centrale della Polizia Criminale” at the
Italian Ministry of Interiors for releasing the data.
6
In our empirical analysis crime numbers are normalized by population.
5
Socio-Economic Inequalities and Organized Crime: An Empirical Analysis
209
Table 1 Variables’ definition and sources
Variable
Absolute Upward
mobility – Q1Q5
Absolute Upward
mobility – Expected rank
Bribery
Compensation of
employees
Corruption for an act
against Official Duties
Source
Acciari et al. (2017)
Acciari et al. (2017)
Concussione – Offences reported by the police to the prosecution
service (2003–2015) – SDI (acronym for System of Investigation)
Cambridge Econometrics (€2005 m)
Corruzione per un atto contrario ai doveri d’ufficio – Offences
reported by the police to the prosecution service (2003–2015) – SDI
(acronym for System of Investigation)
Corruption in public acts Corruzione per un atto d’ufficio – Offences reported by the police to
the prosecution service (2003–2015) – SDI (acronym for System of
Investigation)
Criminal_association
Associazione a delinquere – reported by the police forces to the
judicial authority (1985–2015) – ISTAT
Drugs
Produzione, commercio, ecc. di stupefacenti – reported by the police
forces to the judicial authority (1985–2015) – ISTAT
Economic Activity
Percentage of total population, both employed and unemployed, that
rate – total
constitutes the manpower supply of the labor market – Eurostat
Extortions
Estorsioni – reported by the police forces to the judicial authority
(1985–2015) – ISTAT
Gross fixed capital
Cambridge Econometrics (€2005 m)
formation
Homicide_Mafia
omicidi per motivi di mafia, camorra o ‘ndrangheta – Murder
committed by Mafia reported by the police forces to the judicial
authority (1985–2015) – ISTAT
Homicide_terrorism
Omicidi a scopo terroristico (art. 28- C.P.) – Murders committed by
Terrorists reported by the police forces to the judicial authority
(1985–2015) – ISTAT
Inequality – Net Income Gini and other inequality measures for Net Income – Bank of Italy
(SHIW)
Inequality – Total
Gini and other inequality measures for total consumption – Bank of
consumption
Italy (SHIW)
Inequality – Total
Gini index for total consumption (provincial level) – ISTAT –
consumption
Household budget survey – Processing carried out at the Laboratory
for Analysis of ELEmentary data (Adele Palermo – ISTAT)
Instigation to corrupt – Offences reported by the police to the
Instigation to corrupt
prosecution service (2003–2015) – SDI (acronym for System of
(Istigazione alla
Investigation)
corruzione)
Judicial corruption
Corruzione in atti giudiziari – Judicial corruption – Offences reported
by the police to the prosecution service (2003–2015) – SDI (acronym
for System of Investigation)
Kidnappings for
Sequestro di persona a scopo estorsivo – kidnappings for extortion
extortion purpose
purpose reported by the police forces to the judicial authority
(1985–2003) – ISTAT
(continued)
210
M. Battisti et al.
Table 1 (continued)
Variable
Source
Kidnappings for terrorist Sequestro di persona a scopo terroristico – kidnappings for terrorist
purposes
purposes reported by the police forces to the judicial authority
(1985–2003) – ISTAT
Long-term uneployment Eurostat
rate
Mafia type Association
Associazione a delinquere di stampo mafioso – Mafia criminal
association reported by the police forces to the judicial authority
(1985–2015) – ISTAT
Money laundering
Riciclaggio di denaro – Money laundering – Offences reported by the
police to the prosecution service (2003–2015) – SDI (acronym for
System of Investigation)
Participation rate in
Participation rate in education and training (last 4 weeks). Population
education and training
aged 25–64 – Eurostat
Prostitution
Prostituzione – Prostitution reported by the police forces to the
judicial authority (1985–2015) – ISTAT
Relative mobility
Acciari et al. (2017)
Robberies
Rapina – Robberies reported by the police forces to the judicial
authority (1985–2015) – ISTAT
Secondary Education
Percentage of people aged 25–64 with upper secondary and
level
post-secondary non-tertiary education attainment (levels 3 and
4) – Eurostat
Smuggling
Contrabbando – Smuggling reported by the police forces to the
judicial authority (1985–2015) – ISTAT
Theft
Furto – Theft reported by the police forces to the judicial authority
(1985–2015) – ISTAT
Threats
Minacce – Threats – Offences reported by the police to the
prosecution service (2003–2015) – SDI (acronym for System of
Investigation)
Total hours worked
Cambridge Econometrics (millions)
Usury
Usura – Usury – Offences reported by the police to the prosecution
service (2003–2015) – SDI (acronym for System of Investigation)
(see, e.g. Dia 2016), as well as in the literature (see e.g. Riccardi et al. 2016, and
Fioroni et al. 2017). This approach distinguishes us from, e.g., Calderoni (2011)
who focuses on type I crimes only.7 In addition, from a statistical point of view, we
see organized crime as a latent variable, measured with error. In this perspective, the
higher the number of crimes we consider to measure organized crime, the lower the
measurement error.
Our organized crime variables are based on two alternative approaches using 16
crime variables. The first one is based on Calderoni (2011) and the second approach
employs novel dynamic factor methods proposed by Moench et al. (2013) and
Banbura and Modugno (2014).
Crime data in Calderoni (2011) are integrated by data on other direct measures of Mafia activities:
the number of city councils dissolved for Mafia infiltration, and a measure of assets confiscated to
Mafia clans. See the same article for details on other methods to measure organized crime found in
the literature.
7
Socio-Economic Inequalities and Organized Crime: An Empirical Analysis
211
Table 2 Summary statistics of 5-year averages of crime indices
Calderoni Mean Index (Type
I,II)
Calderoni Rank Index (Type
I,II)
Obs. Mean Min
Max
sd
p25
p50
p75
120 30,378 9150 61,367 11,533 21,623 28,965 37,839
120
52,500 14,813 79,750 13,018 44,125 54,063 60,594
Following Calderoni (2011), we employ two alternative procedures to calculate
the Mafia Index. In the first one, we first normalize each variable to take values
between 0 and 100 with 100 to denote the highest value of Mafia presence. Then, we
compute the Calderoni Mean Index as the average score of all variables. One problem with the average score is that it may overestimate the presence of the mafia in
the Southern regions and underestimate it in the other regions. This is because organized crime is prevalent in the areas of southern Italy. To overcome this problem we
also construct an index based on region’s rank. For each variable, we rank all the
Italian regions in decreasing order. Then we attribute the score of 100 to the region
with the highest rank and proportionally lower scores to the other provinces, according to their rank. Then, we compute the Calderoni Rank Index as the average score
of all variables (see Table 2 for summary statistics).
In addition, we employ the dynamic factor model method to extract a latent factor for organized crime at the regional level. This methodology has not been applied
to such a purpose before. Let xt = (x1t, x2t, …, xnt)′, t = 1, . . , T denote a stationary
n-dimensional vector of crime series standardized to mean 0 and unit variance. We
assume that the factor model takes the following form:
x t = Λft + e t
(1)
ft = Aft −1 + ηt
(2)
where ft is a r × 1 vector of latent common factors of organized crime
and et = (e1t, e2t, …, ent)′, is the idiosyncratic component, uncorrelated with ft at all
leads and lags.8 The errors ηt are assumed to be innovations to the factor. The common component is given by the n × r matrix Λ, which contains factor loadings.
Following Banbura and Modugno (2014) we estimate the dynamic factor model
using a modified Expectation Maximisation (EM) algorithm. The idea of the algorithm is to write the likelihood as if the data were complete and to iterate between
two steps: in the Expectation step the missing data are filled in the likelihood, while
in the Maximisation step this expectation is re-optimized. This modification is
important in our analysis as it allows us to consider a larger number of time-series
that organized crime regardless of whether they have missing observations or not.
In addition to the latent factor at the regional level we extract factors at the macroarea (Centre, North and South) and Italy level for descriptive purposes. In doing so,
we employ two complementary factor analyses. First, we apply the aforementioned
methodology separately at different levels of aggregation. Figures 1 and 2 provide
8
The errors were not allowed to be serially correlated, but this assumption can be relaxed later.
212
M. Battisti et al.
Fig. 1 Factor for Organized crime based on Banbura and Modugno (2014) – Italy-wide Factor for
Organized Crime
Fig. 2 Factor for Organized crime based on Banbura and Modugno (2014) – Center, North, South
Factor levels
the t-plots of the factors for results for Italy-wide and the macro-area factors, respectively. It can be observed that there are some large spikes at the beginning of the
period, indicating a higher intensity of the phenomenon, while fluctuations are much
smaller in the subsequent years.
Table 3 presents the estimates the loadings of the factors and Table 4 the square
loadings (as % of total) to illustrate the relative importance of the different crimes.9
Table 4 suggests that some of the indirect measures of organized crime may have a
high capacity to capture the phenomenon, and that the effect is different across the
different Italian macro regions. For example, different corruption crimes stand out
(see, e.g. Fioroni et al. 2017, on corruption and organized crime), as well as money
laundering in the South (see Barone and Masciandaro 2011, for an analysis of organized crime and money laundering).
The factor loadings (estimated as stationary, non time-varying, values) can be interpreted as
weights telling how much the factor intensity depends (loads) on each crime over the period of
interest.
9
Socio-Economic Inequalities and Organized Crime: An Empirical Analysis
213
Table 3 Factor loadings computed following Banbura and Modugno (2014)
Bribery
Corruption for an action against official duties
Criminal association
Drugs
Extortions
Homicide by Mafia
Mafia type Association
Money laundering
Prostitution
Smuggling
Threats
Usury
Corruption in public acts
Instigation to corrupt
Judicial corruption
Kidnapping for extortion purpose
Italy
−3.966
−0.007
0.765
0.032
0.242
−0.168
−1.004
−2.453
−0.081
−0.012
−2.535
0.687
2.102
−0.397
9.423
−0.225
North
4.294
−3.089
−0.406
−0.007
−0.098
−0.146
0.741
−0.377
0.009
0.013
2.068
0.503
−1.473
−2.336
−5.595
0.068
Center
−31,185
−7.915
−3.635
−0.942
−0.516
−0.732
5.060
28.086
0.438
−0.088
−9.125
−21.516
−55.867
19.441
−26.330
−0.757
South
−0.257
−4.077
0.510
0.019
0.219
−0.163
−0.737
−6.729
−0.086
−0.006
−1.418
−0.850
1.696
−1.327
1.178
−0.220
Table 4 Square of factor loadings computed following Banbura and Modugno (2014), as
percentage of the total
Italy (%)
Bribery
12.71
Corruption for an action against official duties 0.00
Criminal association
0.47
Drugs
0.00
Extortions
0.05
Homicide by Mafia
0.02
Mafia type Association
0.81
Money laundering
4.86
Prostitution
0.01
Smuggling
0.00
Threats
5.19
Usury
0.38
Corruption in public acts
3.57
Instigation to corrupt
0.13
Judicial corruption
71.75
Kidnapping for extortion purpose
0.04
North (%) Centro (%) South (%)
25.49
14,73
0,09
13.20
0.95
23.20
0.23
0.20
0.36
0.00
0.01
0.00
0.01
0.00
0.07
0.03
0.01
0.04
0.76
0.39
0.76
0.20
11.94
63.19
0.00
0.00
0.01
0.00
0.00
0.00
5.91
1.26
2.80
0.35
7.01
1.01
3.00
47.26
4.01
7.55
5.72
2.46
43.27
10.50
1.94
0.01
0.01
0.07
Second, we employ the hierarchical dynamic factor models proposed by Moench,
Ng, and Potter (2013) to account for the correlations between the shocks at the different
levels of aggregation. In particular, we employ this multilevel factor model using common (Italy level – global), block-specific (macro regions), and sub-block-­specific
(regions) to capture the within- and between-block variations in the measurement sys-
214
M. Battisti et al.
Fig. 3 Factor for Organized crime based on Moench, Ng, and Potter (2013) – Italy
Fig. 4 Factor for Organized crime based on Moench, Ng, and Potter (2013) – Macro Regions
tem of organized crime. Given that this method does not allow for missing observations, we only use a set of five variables (Criminal Association, Drugs, Mafia type
Association, Extortions and Prostitution). As it is illustrated by Figs. 3 and 4, the common factor exhibits a similar pattern to the one we obtained using the first method in
Figs. 1 and 2 although it is only based on a much smaller set of variables. Table 5
presents the variance decomposition analysis to document the importance of the variation of aggregate (Italy-wide), block-specific (Macro), and subblock-specific (Regional)
components as well as idiosyncratic noise relative to the total variation in the data.
The variations due to idiosyncratic shocks dominate other variations in all cases.
Overall we can see that regarding the other variations the sub-block specific variations are larger. Notice in particular that in Southern regions (where organized crime
is more widespread) the regional component is relatively high.
215
Socio-Economic Inequalities and Organized Crime: An Empirical Analysis
Table 5 Share F, Share G, Share H, Share Z denote the average variance share across all variables
in the block due to aggregate, block-level, subblock-level and idiosyncratic shocks respective
Center Lazio
Marche
Toscana
Umbria
North Emilia
Romagna
Friuli Venezia
Giulia
Liguria
Lombardia
Piemonte
Trentino Alto
Adige
Valle D’Aosta
Veneto
South Abruzzo
Basilicata
Calabria
Campania
Molise
Puglia
Sardegna
Sicilia
Share F
Aggregate
component
(Italy)
0.10
0.08
0.10
0.19
0.17
Share G
Block –specific
component
(Macro-region)
0.09
0.07
0.09
0.16
0.07
Share H
Sub-block specific
component
(Region)
0.10
0.13
0.09
0.10
0.07
Share Z
Idiosyncratic
noise
0.71
0.72
0.72
0.55
0.69
0.10
0.04
0.17
0.69
0.21
0.20
0.20
0.17
0.09
0.09
0.08
0.07
0.10
0.03
0.06
0.06
0.61
0.68
0.66
0.70
0.15
0.19
0.02
0.00
0.03
0.01
0.00
0.01
0.01
0.01
0.06
0.08
0.13
0.02
0.14
0.07
0.02
0.03
0.04
0.06
0.09
0.06
0.13
0.25
0.15
0.22
0.22
0.22
0.23
0.21
0.70
0.66
0.71
0.72
0.69
0.70
0.75
0.75
0.72
0.72
Inequality and Socio-Economic Mobility
We employ six different inequality metrics that capture different aspects of the distribution: (i) the Gini index, (ii) the Atkinson inequality index,10 and four percentile
ratios: (iii) P90/P10, (iv) P75/P25, (v) P90/P50, and (vi) P75/P50. The Gini and
Atkinson indices take value between 0 and 1 as opposed to the percentile ratios that
do not have this restriction. For each inequality metric, we construct 2 different
measures of inequality based on total consumption and household net income. For
inequality measures on consumption and income we consider all the observations in
which the heads of household are aged from 25 to 65. Table 6 presents summary
statistics of these inequality measures.
For socio-economic mobility, we use the measures computed by Acciari et al.
(2017), based on Italian tax data. In particular our measures of mobility measure
10
For definitions and details on the Gini and Atkinson index see e.g. Cowell (2011).
216
M. Battisti et al.
Table 6 Summary statistics of inequality indices
Variable
Obs.
A. Net income – Households
Gini Index
120
Atkinson inequality index
120
P90/P10
120
P75/P25
120
P90/P50
120
P75/P50
120
B. Total Consumption – Households
Gini Index
118
Atkinson inequality index
118
P90/P10
118
P75/P25
118
P90/P50
118
P75/P50
118
Mean
sd
Min
Max
0.287
0.265
3.733
1.92
1.896
1.382
0.037
0.066
0.814
0.192
0.24
0.087
0.165
0.095
2.111
1.567
1.405
1.224
0.396
0.43
7.087
2.568
2.677
1.628
0.251
0.186
3.084
1.765
1.799
1.335
0.029
0.036
0.419
0.125
0.146
0.053
0.138
0.062
1.961
1.35
1.366
1.152
0.327
0.296
4.82
2.107
2.26
1.432
immobility between parents’ income in 1998 and children’s income in 2012 at provincial level. The three indices we consider are: (i) Relative mobility: this is the
slope of a rank-rank regression between child ranks and parent ranks and measure
the difference in outcomes between children from top vs. bottom income families
within province (Chetty et al. 2014). A high value indicates low mobility; (ii)
Absolute mobility – expected rank: this index measures the expected rank of children from families at the bottom 25% of the national parent income distribution
(Chetty et al. 2014). A high value indicates high mobility; (iii) Absolute mobility –
Q1toQ5 measures the probability of rising from the bottom quintile to the top quintile of the income distribution (Corak and Heisz 1999; Hertz 2006). A high value
indicates high mobility.
Other Covariates
We consider as covariates in our analysis indicators of the economic conditions and
of human capital, under the assumption that bad economic conditions and low levels
of human capital can positively affect organized crime development. In particular,
we use secondary education level, the economic activity rate, the growth rate of
compensation of employee, the growth rate of total hours worked, the participation
in education and training, the long-term unemployment rate, the growth rate of
gross fixed capital formation (see Tables 1 and 7 for the definitions and for summary
statistics).
Socio-Economic Inequalities and Organized Crime: An Empirical Analysis
217
Table 7 Summary statistics for the other covariates
Variable
Employment
Gross fixed capital formation
Compensation of employees
Primary Education level
Secondary level
Total active population
Total hours worked
Economic activity rate
Participation rate in education and training
Long-term unemployment rate
Employment
Obs.
120
120
120
58
58
120
120
76
58
71
120
Mean
sd
0.003
0.010
0.006
0.04
0.007
0.019
47.978
7.477
38.886
4.909
0.005
0.007
0
0.011
53.797
5.57
6.06069 9.47
5.991
17.800
0.003
0.010
Min
−0.024
−0.119
−0.065
32.5
29.56
−0.02
−0.03
43.5
1.187057
4.398
−0.024
Max
0.028
0.078
0.05
61.5
48.11
0.018
0.03
63.75
3.76
0.780
0.028
Methodology
The focus of this paper is to investigate how changes in organized crime (OC) are
related to inequality (INEQ) and social mobility (SM).
Our benchmark model for inequality takes the form of a dynamic panel model:
OCit = ρ OCit −1 + β I INEQit + +γ ′Zit + ξ t + vi + uit ,
(3)
where vi is the fixed effect, ξt is the time effect, and uit is the idiosyncratic error term.
Zit includes a constant and other covariates. Following Blundell and Bond (1998),
we estimate this model using system 2-step GMM up to 4 lags as instrumental variables and robust standard errors.11 Given that the impact of inequality on organized
crime development can be not contemporaneous, we also tried specifications with a
lagged value of INEQ.
In the case of measurement of organized crime by the estimated dynamic factor,
we had to consider differences in this variable to make the series stationary. This
implied considering also INEQ in differences. In this case the estimated dynamic
panel takes the form:
∆OCit = ρ∆OCit −1 + β I ∆ INEQit + γ ′∆ Zit + ξ t + vi + uit
(4)
As for socio-economic mobility, given that our data are only available as a cross-­
section we estimate a simple cross-sectional regression of the form:
OCi = β M SM i + γ ′Zi + ui
The next section contains the results of our econometric analysis.
11
We implement this estimation using the Stata package xtabond2 by Roodman (2009).
(5)
218
M. Battisti et al.
Results
This section presents the results of our econometric analysis. In particular, Section
“Organized Crime and Inequality” discusses the results on inequality and organized
crime, while Section “Organized Crime and Socio-Economic Mobility” those on
socio-economic mobility and OC.
Organized Crime and Inequality
Tables 8 and 9 contain the results of regressions of organized crime on INEQ for
both indices based on Calderoni (2011), i.e. Calderoni Rank Index and Calderoni
Mean Index, considering respectively indices of income inequality and consumption inequality.12 The results show that the coefficients of the effect of inequality on
organized crime have positive and significant coefficients in particular when the
Calderoni Mean Index is utilized in the regressions. Under the null of joint validity
of instruments, the Hansen’s test of over-identification provides us enough evidence
about the validity of our instruments, in all models (at least at 5% significance level).
We then estimated specifications in which we added lagged values of inequality
indices. Table 10 contains the results of specifications for consumption inequality, as
the effects of income inequality resulted scarcely significant.13 Results in Table 10
shows that, with the Calderoni Mean Index, all six metrics of inequality measures have
positive and significant coefficients: in particular, the contemporaneous values of P90/
P10, P90/P50 and P75/P50 and the lagged values of the Gini and Atkinson Indices and
P75/P25. In the case of the Calderoni Rank Index, the coefficients of the lagged values
of the Atkinson index, P90/P10, P75/P25, P90/P50 are positive and significant.
Given the results presented Tables 8, 9 and 10 we kept as our preferred metric of
inequality the P90/P10 index and its lagged value.14 Table 11 contains the results of
regressions in which we added other covariates, related to potential economic deter-
Regressions are run on data from 19 out of 20 Italian regions. The region of Val d’Aosta is
dropped for lack of data.
13
In particular, results for income inequality return a significant coefficient only with the Calderoni
Mean Index for the lagged values of the Atkinson index (at 5%) and of P90/P10 (at 1%).
14
In particular, we chose P90/P10 as our preferred (consumption) inequality measure for the following reasons. P75/P50 in Tables 7 and 8 is significant 4 times out of 4, while P90/P10 is significant 3 times out of four. However, in Table 9, P75/P50 is scarcely significant. Moreover, in Table 9
we see that P90/P10 is significant in 2 cases out of 4 (considering both the coefficients for contemporaneous and lagged inequality indices), as other inequality measures, but it is the only one with
a highly significant coefficient in at least one case. This result is likely to depend on the fact that
the relationship between the extreme quintiles is more representative of the dynamics of inequality
over time than measures based on quintiles that mostly capture the dynamics of the share of income
of the middle class (see e.g. Garbinti et al. 2018)
12
period6
period5
period4
period3
P75/P50
P90/P50
P75/P25
2.47∗∗
(0.90)
(3)
0.72∗∗∗
(0.06)
8.19
(7.37)
(4)
0.74∗∗∗
(0.20)
8.44∗
(4.20)
(5)
0.72∗∗∗
(0.09)
(6)
0.69∗∗∗
(0.10)
17.78∗∗
(8.13)
6.78∗∗∗ 7.56∗∗∗ 6.36∗∗∗ 7.11∗∗∗ 6.45∗∗∗ 7.51∗∗∗
(1.67)
(1.82)
(1.46)
(1.55)
(1.38)
(1.04)
11.55∗∗∗ 11.48∗∗∗ 10.88∗∗∗ 11.32∗∗∗ 10.07∗∗∗ 11.18∗∗∗
(1.57)
(1.95)
(1.56)
(1.79)
(1.73)
(1.57)
4.85∗
4.18
3.85∗∗
3.86∗
4.27∗
4.64∗∗∗
(2.67)
(2.64)
(1.74)
(2.20)
(2.18)
(1.47)
5.65∗∗∗ 5.44∗∗
4.43∗∗
5.05∗∗∗ 4.93∗∗∗ 6.21∗∗∗
Dependent var.
Mafia rank index
Regressors
(1)
(2)
Lagged Mafia Index 0.60∗∗
0.72∗∗∗
(0.27)
(0.17)
Gini
45.96
(61.63)
Atkinson
2.10
(19.49)
P90/P10
−0.68
(0.98)
0.42
(0.87)
0.55
(2.66)
−0.11
−0.98
(1.34)
0.08
(0.94)
−0.02
(2.54)
−1.87
−1.08
(1.06)
0.77
(1.01)
0.96
(2.73)
−1.01
−0.06
(1.17)
2.07∗
(1.01)
1.22
(2.73)
−0.04
Mafia mean index
(7)
(8)
(9)
(10)
0.87∗∗∗ 0.96∗∗∗ 0.88∗∗∗ 0.95∗∗∗
(0.08)
(0.08)
(0.06)
(0.07)
76.51
(56.72)
33.16
(25.84)
3.53∗∗∗
(1.04)
19.70∗∗
(8.08)
−0.49
(1.05)
0.64
(1.08)
2.08
(2.69)
1.12
19.80∗∗
(8.50)
(continued)
48.77∗∗∗
(16.61)
0.68
(1.18)
1.37
(1.05)
1.41
(2.73)
1.06
(11)
(12)
0.95∗∗∗ 0.91∗∗∗
(0.09)
(0.09)
Table 8 This tables presents dynamic panel regressions of Mafia Rank Index and Mafia Mean Index based on Calderoni (2011) on alternative consumption
inequality indices. All results are based on the baseline sample of 5-year averages. All models control for fixed effects and time period effects. Estimation is
based on system GMM (Blundell and Bond (1998) using instruments up to the 4th lag. Each cell reports the coefficient estimates and robust standard errors in
the parenthesis. ***, **, and * denote significance of the regression coefficient at 1%, 5%, and 10%
Socio-Economic Inequalities and Organized Crime: An Empirical Analysis
219
Mafia rank index
(1)
(2)
(1.55)
(2.04)
−6.55
2.46
(11.44)
(4.88)
95
95
19
19
0.818
0.730
(3)
(1.57)
−5.71
(3.59)
95
19
0.925
(4)
(1.37)
−13.01
(9.30)
95
19
0.761
(5)
(1.51)
−11.58
(7.07)
95
19
0.986
(6)
(1.39)
−20.20∗
(9.81)
95
19
0.749
Mafia mean index
(7)
(8)
(1.45)
(2.31)
−15.51 −6.46
(18.42) (10.30)
95
95
19
19
0.540
0.387
(9)
(1.39)
−7.02
(6.28)
95
19
0.446
(10)
(1.28)
−35.74∗∗
(16.38)
95
19
0.555
(11)
(1.37)
−35.22∗
(17.73)
95
19
0.554
(12)
(1.38)
−63.34∗∗
(25.81)
95
19
0.511
All results are based on the baseline sample of 5-year averages. All models control for fixed effects and time period effects. Estimation is based on system
GMM (Blundell and Bond (1998) using instruments up to the 4th lag. Each cell reports the coefficient estimates and robust standard errors in the parenthesis.
∗∗∗, ∗∗, and ∗ denote significance of the regression coefficient at 1%, 5%, and 10%
Observations
Number of Regions
Hansen test p-value
Constant
Dependent var.
Regressors
Table 8 (continued)
220
M. Battisti et al.
period6
period5
period4
period3
P75/P50
P90/P50
P75/P25
5.65
(5.74)
(3)
0.63∗∗∗
(0.16)
10.26
(14.35)
(4)
0.75∗∗∗
(0.12)
2.72
(6.86)
(5)
0.73∗∗∗
(0.10)
(6)
0.74∗∗∗
(0.13)
53.59∗∗
(24.95)
8.30∗∗∗ 6.66∗∗∗ 6.97∗∗∗ 8.28∗∗∗ 7.61∗∗∗ 6.09∗∗∗
(1.35)
(1.72)
(1.50)
(1.42)
(1.21)
(1.34)
11.94∗∗∗ 10.19∗∗∗ 10.99∗∗∗ 11.98∗∗∗ 11.41∗∗∗ 9.82∗∗∗
(2.25)
(2.63)
(1.97)
(2.66)
(2.38)
(1.75)
4.38∗
7.88∗∗∗ 5.51∗
4.67
4.24∗
3.33
(2.35)
(2.61)
(2.67)
(2.72)
(2.07)
(2.21)
5.61∗∗∗ 6.94∗∗∗ 6.00∗∗∗ 5.71∗∗
5.50∗∗∗ 5.36∗∗∗
Dependent var.
Mafia rank index
Regressors
(1)
(2)
Lagged Mafia Index 0.80∗∗∗ 0.46∗∗∗
(0.09)
(0.15)
Gini
41.41
(42.08)
Atkinson
82.54∗
(42.77)
P90/P10
(continued)
Mafia mean index
(7)
(8)
(9)
(10)
(11)
(12)
0.91∗∗∗ 0.99∗∗∗ 1.04∗∗∗ 0.98∗∗∗ 0.93∗∗ 0.94∗∗∗
(0.20)
(0.20)
(0.17)
(0.17)
(0.33) (0.18)
179.06∗∗
(71.75)
151.78∗∗
(61.62)
13.85∗∗∗
(4.51)
33.27
(19.90)
50.19
(30.88)
98.06∗∗
(37.02)
1.62
1.11
0.48
0.42
−0.39 −0.91
(2.20)
(2.47)
(2.12)
(1.72)
(2.10) (1.80)
1.51
1.72
−0.29
0.11
0.87
−0.53
(2.10)
(2.39)
(2.67)
(2.13)
(2.09) (1.86)
3.17
4.58
3.98
1.11
4.83
0.47
(4.70)
(4.27)
(4.71)
(4.51)
(4.64) (3.68)
2.57
1.44
0.22
0.57
3.64
1.81
Table 9 This tables presents dynamic panel regressions of Mafia Rank Index and Mafia Mean Index based on Calderoni (2011) on alternative inequality
indices. All results are based on the baseline sample of 5-year averages. All models control for fixed effects and time period effects. Estimation is based on
system GMM (Blundell and Bond (1998) using instruments up to the 4th lag. Each cell reports the coefficient estimates and robust standard errors in the
parenthesis. ***, **, and * denote significance of the regression coefficient at 1%, 5%, and 10%.
Socio-Economic Inequalities and Organized Crime: An Empirical Analysis
221
(3)
(1.64)
−11.31
(15.53)
95
19
0.979
(4)
(2.00)
−16.27
(25.23)
95
19
0.986
(5)
(1.76)
−1.94
(12.39)
95
19
0.968
(6)
(1.50)
−68.27∗∗
(32.19)
95
19
0.998
Mafia mean index
(7)
(8)
(2.41)
(2.78)
−42.68
−30.40
(25.42)
(19.12)
95
95
19
19
0.103
0.0729
(9)
(2.18)
−45.61∗∗
(19.59)
95
19
0.0866
(10)
(2.57)
−58.36
(40.67)
95
19
0.0571
(11)
(3.33)
−88.77
(71.94)
95
19
0.169
(12)
(1.78)
−128.52∗∗
(57.21)
95
19
0.232
All results are based on the baseline sample of 5-year averages. All models control for fixed effects and time period effects. Estimation is based on system
GMM (Blundell and Bond (1998) using instruments up to the 4th lag. Each cell reports the coefficient estimates and robust standard errors in the parenthesis.
∗∗∗, ∗∗, and ∗ denote significance of the regression coefficient at 1%, 5%, and 10%
Mafia rank index
(1)
(2)
(1.71)
(1.47)
Constant
−9.86
−5.05
(11.01)
(11.76)
Observations
95
95
Number of Regions 19
19
Hansen test p-value 0.983
0.187
Dependent var.
Regressors
Table 9 (continued)
222
M. Battisti et al.
P90/P50
Lagged P75/P25
P75/P25
Lagged P90/P10
Dependent var.
Mafia rank index
Regressors
(1)
(2)
Lagged Mafia Index 0.42∗∗
0.42∗∗
(0.17)
(0.15)
Gini
78.50
(72.39)
Lagged Gini
41.35
(31.44)
Atkinson
57.76
(60.21)
Lagged Atkinson
48.23∗
(26.09)
P90/P10
1.25
(5.22)
3.81∗
(2.13)
(3)
0.35
(0.25)
−3.80
(13.20)
20.19∗
(11.46)
0.32
(12.23)
(4)
(5)
0.76∗∗∗ 0.50
(0.08)
(0.31)
(6)
0.47
(0.29)
Mafia mean index
(7)
(8)
(9)
(10)
(11)
0.86∗∗∗ 0.85∗∗∗ 0.92∗∗∗ 0.84∗∗∗ 0.92∗∗∗
(0.08)
(0.09)
(0.16)
(0.09)
(0.08)
32.85
(46.96)
70.80∗∗
(33.06)
20.39
(41.88)
53.51∗
(29.15)
15.28∗∗∗
(4.30)
−2.84
(3.46)
3.53
(15.78)
14.98∗
(8.27)
21.79∗∗
(9.80)
(continued)
(12)
0.84∗∗∗
(0.07)
Table 10 This table presents dynamic panel regressions of the Mean Mafia Index, which is the Mafia Rank Index based on Calderoni (2011), on P90/P10 ratio
and other determinants. All results are based on the baseline sample of 5-year averages. All models control for fixed effects and time period effects. Each cell
reports the coefficient estimates and robust standard errors in the parenthesis. All regression models include fixed effects and time effects. Estimation is based
on system GMM (Blundell and Bond (1998) using instruments up to the 4th lag. ***, **, and * denote significance of the regression coefficient at 1%, 5%, and
10%.
Socio-Economic Inequalities and Organized Crime: An Empirical Analysis
223
(5)
13.74∗
(7.27)
(6)
−1.43
(1.16)
−0.97
(1.10)
−0.47
(3.08)
0.54
(1.87)
−18.61
(14.26)
95
19
0.966
−1.28
(1.24)
−0.85
(1.23)
−0.33
(3.07)
0.37
(1.76)
−5.43
(10.20)
95
19
0.961
Mafia mean index
(7)
(8)
1.05
(1.54)
1.03
(2.19)
4.16
(3.18)
1.11
(1.23)
−35.72∗∗
(15.23)
95
19
0.344
(9)
−0.89
(1.23)
−0.59
(1.05)
−0.57
(2.43)
0.20
(1.56)
−23.77
(25.63)
95
19
0.981
(10)
(12)
86.02∗
(41.14)
−7.93
(26.16)
0.06
−1.28
(1.08)
(1.37)
−0.06
−0.71
(1.45)
(1.81)
2.31
1.70
(2.79)
(3.07)
2.27
0.85
(1.82)
(1.61)
−39.73∗∗ −96.18∗∗
(14.84)
(37.50)
95
95
19
19
0.910
0.989
(11)
1.97
(8.22)
All results are based on the baseline sample of 5-year averages. All models control for fixed effects and time period effects. Estimation is based on system
GMM (Blundell and Bond (1998) using instruments up to the 4th lag. Each cell reports the coefficient estimates and robust standard errors in the parenthesis.
∗∗∗, ∗∗, and ∗ denote significance of the regression coefficient at 1%, 5%, and 10%
Observations
Number of Regions
Hansen test p-value
Constant
period6
period5
period4
period3
Lagged P75/P50
31.88
(90.24)
5.63
(43.36)
5.55∗∗
5.09∗∗∗ 5.00∗∗∗ 5.37∗∗ 6.00∗∗∗ 5.48∗∗
(2.11)
(1.45)
(1.57)
(2.19)
(1.44)
(2.08)
10.05∗∗∗ 9.98∗∗∗ 10.75∗∗∗ 8.70∗∗∗ 9.72∗∗∗ 10.42∗∗∗
(1.97)
(1.83)
(1.49)
(1.96)
(2.64)
(2.16)
7.22∗∗
7.15∗∗ 6.45∗∗
1.48
4.12
5.84∗∗
(3.10)
(2.87)
(2.97)
(2.24)
(4.51)
(2.42)
7.85∗∗∗ 7.37∗∗∗ 7.49∗∗∗ 4.04∗∗ 6.91∗∗ 6.67∗∗∗
(1.87)
(1.71)
(1.77)
(1.74)
(3.01)
(1.69)
−17.60
−6.92
−1.11
−24.51 −15.19 −39.62
(19.88)
(13.03) (16.68)
(20.99) (30.31) (73.91)
95
95
95
95
95
95
19
19
19
19
19
19
0.360
0.405
0.518
0.675
0.549
0.399
(4)
P75/P50
(3)
Mafia rank index
(1)
(2)
Dependent var.
Regressors
Lagged P90/P50
Table 10 (continued)
224
M. Battisti et al.
Gross fixed
capital
formation
Long-­run
unemployment
Compensation
of employees
Secondary
Education level
Economic
activity rate
Lagged P90/
P10
(3.10)
(0.30)
−0.77∗∗
(1.98)
0.13
(0.05)
(2.07)
1.76
(1.38)
1.15
(0.08)
(0.15)
−0.20
(2.15)
1.52
(1.47)
1.16
(0.10)
(0.26)
−0.31
(2.26)
1.67
(1.94)
0.66
(12)
(0.05)
(13)
(1.88)
(14)
(1.19)
(30.03)
(37.95)
(0.14)
−0.24
(1.74)
0.75
−3.32
(0.55)
(0.06)
0.91
23.15
(0.72)
(0.21)
−0.19
(2.34)
0.89
0.30
(29.36)
(54.31)
(0.10)
0.48
−3.12∗∗∗
−32.20
(0.11)
−0.21∗
(1.84)
1.60
(1.52)
0.12
26.97
(0.44)
(0.25)
(0.11)
0.56
(0.45)
(0.20)
(11)
0.08
(0.21)
Mafia mean index
(9)
(10)
(15)
(16)
(0.10)
(0.25)
−0.35
(2.39)
1.47
(2.01)
0.85
(continued)
(0.15)
−0.21
(1.88)
0.46
(1.50)
1.43
(0.08)
0.84∗∗∗ 0.67∗∗∗ 0.65∗∗∗ 0.62∗∗∗ 0.70∗∗∗ 0.66∗∗∗ 0.67∗∗∗ 0.68∗∗∗ 0.65∗∗∗
(8)
−0.42
(0.29)
(0.20)
(1.06)
1.22
(2.59)
−2.12
(0.07)
0.85∗∗∗
(7)
(0.22)
(0.92)
1.12
(1.67)
−1.88
(0.07)
0.92∗∗∗
(6)
−0.71∗∗∗ −1.54∗∗∗ −0.75∗∗∗ −0.86∗∗∗
(2.28)
7.52∗∗∗
(3.22)
2.49
(0.08)
0.84∗∗∗
(5)
−0.79∗∗∗ −0.60∗
(0.98)
(1.78)
(1.18)
(1.11)
(1.86)
2.09∗∗
(3.31)
−0.07
(2.37)
(1.08)
(0.06)
−2.42
3.66∗∗∗ 2.06∗
(0.09)
−0.00
(0.06)
−1.99
0.63
(0.06)
P90/P10
0.85∗∗∗ 0.93∗∗∗
0.93∗∗∗ 0.92∗∗∗
(4)
Lagged Mafia
Index
(3)
Mafia rank index
(1)
(2)
Dependent var
Regressors
Table 11 This table presents dynamic panel regressions of the Mean Mafia Index, which is the Mafia Rank Index based on Calderoni (2011), on P90/P10 ratio and other
determinants
(24.61)
(2.16)
(1.21)
0.410
Hansen test
p-value
0.456
19
−2.42
(2.98)
(24.54)
47.61∗
(0.00)
0.00
(0.00)
0.167
19
55
(2.85)
0.943
19
72
(15.77)
43.43∗∗
(1.87)
(2.61)
(3.44)
0.902
19
70
(20.51)
0.987
19
72
(15.80)
0.997
19
72
(21.67)
67.91∗∗∗ 48.34∗∗∗ 57.95∗∗
0.0938
19
55
(0.00)
0.00
(29.45)
49.39
(1.61)
(2.31)
(2.21)
0.867
19
95
(5.10)
−4.39
(1.44)
0.628
19
72
(12.34)
11.79
(1.84)
4.23∗∗∗ 0.40
(1.85)
3.84∗
(2.12)
9.05∗∗∗ 4.30∗
(0.00)
0.309
19
55
(18.20)
17.63
(0.00)
0.00
(2.78)
−0.48
(3.99)
3.76
(1.90)
0.971
19
72
(9.83)
14.64
(2.02)
0.28
(1.93)
4.82∗∗
(3.48)
0.739
19
70
(14.42)
14.70
(2.16)
0.04
(2.56)
4.03
(2.60)
0.972
19
72
(11.94)
16.73
(2.02)
0.43
(2.72)
5.00∗
0.971
19
72
(11.35)
14.37
(3.11)
0.30
(2.57)
5.01∗
(2.27)
1.21
0.376
19
55
(18.27)
14.72
(0.00)
0.00
(2.85)
−0.17
(5.58)
5.38
(0.00)
0.00
(2.43)
1.53
(16)
(3.40)
0.42
(15)
All results are based on the baseline sample of 5-year averages. All models control for fixed effects and time period effects. Each cell reports the coefficient estimates and
robust standard errors in the parenthesis. All regression models include fixed effects and time effects. Estimation is based on system GMM (Blundell and Bond (1998) using
instruments up to the 4th lag. ∗∗∗, ∗∗, and ∗ denote significance of the regression coefficient at 1%, 5%, and 10%
19
Number of
Regions
(18.96)
72
(6.67)
95
0.00
(27.69)
(3.24)
47.21∗∗
(1.39)
(24.64)
59.12∗∗ 2.25
1.39
(2.34)
−11.42
2.15
(2.92)
1.22
(2.74)
0.82
1.71
(14)
1.08
0.00
(13)
−0.19
5.66∗∗∗ 0.93
(12)
(144.82)
(11)
(144.53)
Mafia mean index
(9)
(10)
2.52
(8)
−314.74∗∗
(7)
(26.40)
7.17∗∗∗
(1.63)
−2.76
(3.36)
−2.56
(6)
49.36∗
(2.24)
0.97
(2.24)
6.92∗∗∗
(5)
57.85∗∗
−0.37
−0.12
(2.61)
(0.00)
55.15∗∗ −2.31
(2.67)
−2.31
(1.23)
−1.84
−0.88
(4)
0.00
(3)
−1.64
−1.10
Mafia rank index
(1)
(2)
Observations
Constant
Period6
Period5
Period4
Period3
Part. in
education and
training
Total hours
worked
Dependent var
Regressors
Table 11 (continued)
Socio-Economic Inequalities and Organized Crime: An Empirical Analysis
227
minants of OC.15 Table 11 shows that the lagged value of P90/P10 has a positive and
significant coefficient in almost all the specifications with the Mafia Rank Index.
Table 12 presents the results where the measure of organized crime is based on
the innovative method we described in Section 2.1 based on the estimation of a
dynamic common factor.16 We can see that the coefficients of the indices of inequality (in this case appearing as differences) have positive and significant coefficients
with the exception of P75/P25 and P75/P50.
Table 13 contains the results of the regressions with additional covariates when
we consider the effect of consumption inequality on the factor index computed following Banbura and Modugno (2014). 17 We can observe that in almost all the specifications the effect of inequality (in differences) is positive and significant.
Organized Crime and Socio-Economic Mobility
In this section, we present the results of cross-section regressions estimating the
effect of indicators of socio-economic mobility on OC. The analysis is carried out
at provincial level. Table 14 contains the summary statistics. Table 15 contains simple regressions of our two organized crime measures (Calderoni Rank Index and
Calderoni Mean Index) on the three metrics of socio-economic mobility we considered in this report only and a constant, while Tables 16, 17 and 18 adds the covariates related to economic conditions and human capital levels to regressions with the
Calderoni Mean Index.18 The mobility indices’ coefficients have the expected signs
and are highly significant. The same result holds for Table 19, which reports the
results for the correlation of the relative mobility index on the Calderoni Rank Index.19
Discussion
The main findings of our study are twofold. First, it documents the linkages between
organized crime and inequality. We find that higher levels of inequality can lead to
higher organized crime development using the percentile ratio P90/P10 of conWe only report results for consumption inequality. Regressions on income inequality returned
positive and significant coefficients for the lagged value of P90/P10 in Models 1, 2, 4, 5 with the
Calderoni Rank Index.
16
We only report results for consumption inequality, as regressions on income inequality measures
did not return significant results.
17
We also estimated regressions using the Hierarchical dynamic factors, but the results were not
significant. This is likely due to the fact that we used only five variables to estimate them.
18
The set of covariates used for the regional and provincial analysis do not perfectly match because
of data availability. Model 7 in Tables 15, 16 and 17 contains a dummy for the Northern regions as
the latter proved to be highly significant in regressions on the mobility indices and macro-region
dummies.
19
The results for the other mobility indices are not significant.
15
Observations
Constant
Period6
Period5
Period4
Period3
ΔP75/P50
ΔP90/P50
ΔP75/P25
ΔP90/P10
ΔAtkinson
ΔGini
Dependent variable
Regressors
Lagged Mafia Index
0.01
(0.02)
0.01
(0.03)
0.03
(0.04)
0.01
(0.03)
−0.02
(0.02)
95
0.00
(0.02)
0.01
(0.04)
0.03
(0.04)
0.00
(0.02)
−0.01
(0.02)
95
−0.00
(0.03)
0.00
(0.04)
0.04
(0.06)
−0.01
(0.03)
−0.01
(0.03)
95
−0.03∗
(0.02)
−0.02
(0.03)
−0.02
(0.02)
−0.01
(0.02)
0.01
(0.01)
95
Hierarchical dynamic factor analysis
(1)
(2)
(3)
(4)
−0.43
−0.41
−0.37
−0.37∗
(0.25)
(0.25)
(0.32)
(0.19)
1.42∗∗
(0.64)
1.16∗∗
(0.53)
0.15∗
(0.08)
0.08
(0.16)
−0.00
(0.03)
0.01
(0.04)
0.04
(0.04)
0.02
(0.03)
−0.01
(0.02)
95
0.34∗∗
(0.14)
(5)
−0.32∗
(0.17)
−0.52
(0.40)
−0.04
(0.02)
−0.03
(0.03)
−0.05∗∗∗
(0.02)
−0.02
(0.02)
0.03∗
(0.01)
95
(6)
−0.26∗
(0.15)
0.06
(0.04)
0.04
(0.05)
0.09
(0.05)
0.03
(0.03)
−0.05
(0.04)
95
0.09
(0.06)
0.06
(0.07)
0.10
(0.06)
0.02
(0.03)
−0.06
(0.05)
95
EM algorithm
(7)
(8)
−0.09∗ −0.11
(0.05)
(0.08)
2.08∗
(1.02)
1.51∗
(0.77)
Table 12 The tables presents regressions of two latent factors on alternative inequality of consumption indices
0.07
(0.05)
0.04
(0.05)
0.10∗
(0.05)
0.01
(0.04)
−0.05
(0.04)
95
0.14∗∗
(0.07)
(9)
−0.16∗
(0.08)
0.02
(0.07)
0.01
(0.07)
0.05
(0.07)
−0.02
(0.04)
−0.01
(0.05)
95
0.23
(0.26)
(10)
−0.12
(0.08)
0.03
(0.04)
0.02
(0.06)
0.06
(0.04)
0.01
(0.03)
−0.03
(0.04)
95
0.24∗∗∗
(0.07)
(11)
−0.11
(0.07)
1.18
(1.19)
0.03
(0.08)
−0.01
(0.07)
0.06
(0.08)
0.00
(0.04)
−0.02
(0.06)
95
(12)
−0.12∗∗
(0.05)
228
M. Battisti et al.
Hierarchical dynamic factor analysis
(1)
(2)
(3)
(4)
19
19
19
19
0.280
0.297
0.574
0.445
(5)
19
0.553
(6)
19
0.307
EM algorithm
(7)
(8)
19
19
0.624
0.219
(9)
19
0.987
(10)
19
0.210
(11)
19
0.404
(12)
19
0.461
In Panel A, we have the results of a factor constructed using a hierachical dynamic factor methodology, while in Panel B we show the results of a dynamic
factor estimated by using a modified Expectation Maximisation (EM) algorithm. Given that the latent factors are constructed on transformed data to endure
stationarity (growth rates) we also transform the regressors into first differences, too. All results are based on the baseline sample of 5-year averages. Each cell
reports the coefficient estimates and robust standard errors in the parenthesis. All regressions control for fixed effects and time period effects. ∗∗∗, ∗∗, and ∗
denote significance of the regression coefficient at 1%, 5%, and 10%
Dependent variable
Regressors
Number of Regions
Hansen test p-value
Socio-Economic Inequalities and Organized Crime: An Empirical Analysis
229
Period6
Period5
Period4
Period3
ΔPart. in education and training
ΔTotal hours worked
ΔGross fixed capital formation
ΔLong-run unemployment
ΔCompensation of employees
ΔSecondary Education level
ΔEconomic activity rate
ΔP90/P10
Dependent variable
Regressors
Lagged Mafia Index
0.07
(0.05)
0.04
(0.05)
0.10∗
(0.05)
0.01
0.00
(0.00)
0.00
(0.00)
0.03
(0.05)
−0.06
Mafia factor index
(1)
(2)
−0.16∗
−0.48∗∗∗
(0.08)
(0.16)
0.14∗∗
0.07∗
(0.07)
(0.04)
−0.03
(0.03)
0.00
(0.00)
0.00
(0.00)
0.02
(0.05)
−0.02
−0.00
(0.02)
(3)
−0.48∗∗∗
(0.05)
0.02
(0.04)
0.06
(0.06)
0.01
(0.05)
0.07
(0.04)
−0.02
−0.08
(0.70)
(4)
−0.22∗∗
(0.08)
0.10∗∗
(0.04)
0.00
(0.00)
0.00
(0.00)
0.03
(0.04)
0.05
−0.02
(0.02)
(5)
−0.47∗∗∗
(0.11)
0.07∗∗
(0.03)
0.11∗∗
(0.05)
0.05
(0.04)
0.09∗
(0.04)
0.02
−0.52
(0.41)
(6)
−0.13
(0.08)
0.10∗
(0.05)
Table 13 This table presents dynamic panel regressions of the Mafia Factor Index on P90/P10 ratio and other determinants
0.05
(0.08)
0.04
(0.05)
0.08∗
(0.04)
0.00
0.03
(1.91)
(7)
−0.13∗
(0.07)
0.12∗∗
(0.05)
−0.02
(0.09)
0.00
(0.00)
0.00
(0.00)
0.00
(0.00)
−0.06
(8)
−0.43∗
(0.25)
0.05
(0.07)
230
M. Battisti et al.
Mafia factor index
(1)
(2)
(0.04)
(0.05)
−0.05
0.04
(0.04)
(0.03)
95
53
19
19
0.987
0.688
(3)
(0.05)
0.00
(0.00)
36
19
0.564
(4)
(0.03)
−0.02
(0.04)
95
19
1.000
(5)
(0.09)
−0.03
(0.05)
51
19
0.635
(6)
(0.02)
−0.07∗∗
(0.03)
95
19
1.000
(7)
(0.03)
−0.05
(0.04)
95
19
1.000
(8)
(0.11)
0.04
(0.13)
36
19
0.838
All results are based on the baseline sample of 5-year averages. All models control for fixed effects and time period effects. Given that the latent factors are
constructed on transformed data to endure stationarity (growth rates) we also transform the regressors into first differences, too. Each cell reports the coefficient
estimates and robust standard errors in the parenthesis. All regression models include fixed effects and time effects. Estimation is based on system GMM
(Blundell and Bond (1998) using instruments up to the 4th lag. ∗∗∗, ∗∗, and ∗ denote significance of the regression coefficient at 1%, 5%, and 10%
Observations
Number of Regions
Hansen test p-value
Constant
Dependent variable
Regressors
Socio-Economic Inequalities and Organized Crime: An Empirical Analysis
231
232
M. Battisti et al.
Table 14 Summary statistics on socio-economic mobility and OC measures at provincial level
Variable
A. Organized Crime Index
A.3 Calderoni Mean Index
(Type I,II)
A.4 Calderoni Rank Index (Type
I,II)
B. Social Mobility
B.1 Absolute Upward Mobility:
Expected Rank
B.2 Absolute Upward Mobility:
Q1Q5
B.3 Relative Mobility
N Mean
95
Min
2.003
Max
0.453 100
sd
10.163
p25
p50
0.820
0.970
p75
1.051
95 50.526 15.855 93.816 13.005 42.039 50.724 59.474
95
0.463
0.371 0.625
0.059
0.410
0.457
0.523
95
0.131
0.042 0.389
0.064
0.077
0.112
0.188
95
0.168
0.095 0.222
0.028
0.148
0.169
0.190
Table 15 The tables presents cross-sectional regressions of three alternative socio-economic
mobility measures
Dependent variable
Regressors
Absolute Upward
Mobility: Expected
Rank
Mafia mean index (Type I,II)
(7)
(8)
(9)
−60.35∗∗∗
Mafia rank index (Type I,II)
(10)
(11)
(12)
−53.19∗∗
(9.776)
(20.72)
−50.32∗∗∗
Absolute Upward
Mobility: Q1Q5
−39.19∗∗
(9.324)
Relative Mobility
Constant
Observations
R-squared
48.81∗∗∗
(4.778)
95
0.269
27.42∗∗∗
(1.471)
95
0.218
(18.56)
116.7∗∗∗
(23.62)
1.25
(3.901)
95
0.235
179.2∗∗∗
(42.37)
75.18∗∗∗ 55.65∗∗∗ 20.44∗∗∗
(9.849)
(2.842)
(7.253)
95
95
95
0.064
0.041
0.17
All results are based on the baseline sample of 5-year averages. Each cell reports the coefficient
estimates and robust standard errors in the parenthesis. ∗∗∗, ∗∗, and ∗ denote significance of the
regression coefficient at 1%, 5%, and 10%
sumption inequality. Second, we find that lower levels of socio-economic mobility
are associated with organized crime development.
An important issue is whether changes in welfare are better measured by consumption inequality rather than income inequality, especially when one examines
the role of inequality in organized crime. As argued by Attanasio and Pistaferri
(2016) consumption inequality is potentially a better measure of changes in welfare
than income inequality. According to Friedman’s permanent income hypothesis, in
fact, households prefer a smooth consumption flow, that is they choose to consume
a constant fraction of the permanent income because annual income is too volatile.
Assuming that income can be decomposed into a permanent component and a tran-
51.21∗∗∗
(5.596)
95
0.282
46.82∗∗∗
(6.382)
95
0.301
Mafia mean index
(1)
(2)
−40.13∗∗
−42.90∗∗
(17.24)
(16.94)
−0.213
−0.376∗
(0.173)
(0.207)
0.355
(0.232)
51.10∗∗∗
(5.614)
95
0.284
−18.89
(41.57)
(3)
−41.25∗∗
(17.38)
−0.205
(0.174)
58.19∗∗
(27.66)
95
0.283
−0.217
(0.885)
(4)
−41.73∗∗
(18.43)
−0.302
(0.386)
50.60∗∗∗
(5.489)
95
0.287
−17.71
(20.16)
(5)
−42.77∗∗
(17.68)
−0.193
(0.173)
51.32∗∗∗
(5.480)
95
0.303
−124.7
(84.73)
(6)
−44.09∗∗
(16.80)
−0.211
(0.170)
0.345
(0.876)
51.00∗∗∗
(5.562)
95
0.284
(7)
−37.81∗∗
(18.74)
−0.27
(0.238)
All results are based on the baseline sample of 5-year averages. Each cell reports the coefficient estimates and robust standard errors in the parenthesis. ∗∗∗,
∗∗, and ∗ denote significance of the regression coefficient at 1%, 5%, and 10%
Observations
R-squared
Constant
Part. in education and training
Total hours worked
Gross fixed capital formation
Long-run unemployment
Compensation of employees
Secondary Education level
Economic activity rate
Dependent variable
Regressors
Absolute Upward Mobility: Expected Rank
Table 16 The table presents cross-sectional regressions
Socio-Economic Inequalities and Organized Crime: An Empirical Analysis
233
42.59∗∗∗
(6.679)
95
0.27
37.63∗∗∗
(7.295)
95
0.288
Mafia mean index
(1)
(2)
−24.65∗∗
−26.69∗∗
(11.80)
(11.43)
−0.335∗∗
−0.500∗∗∗
(0.134)
(0.178)
0.347
(0.231)
42.30∗∗∗
(6.690)
95
0.271
−14.94
(41.43)
(3)
−25.22∗∗
(11.83)
−0.331∗∗
(0.134)
42.43
(26.98)
95
0.27
0.00515
(0.876)
(4)
−24.63∗∗
(11.93)
−0.332
(0.396)
41.67∗∗∗
(6.505)
95
0.273
−14.01
(19.68)
(5)
−25.87∗∗
(11.82)
−0.326∗∗
(0.132)
41.64∗∗∗
(6.426)
95
0.291
−123.4
(83.71)
(6)
−27.93∗∗
(11.60)
−0.339∗∗
(0.131)
0.517
(0.856)
43.06∗∗∗
(6.721)
95
0.273
(7)
−22.38∗
(12.17)
−0.410∗∗
(0.182)
All results are based on the baseline sample of 5-year averages. Each cell reports the coefficient estimates and robust standard errors in the parenthesis. ∗∗∗,
∗∗, and ∗ denote significance of the regression coefficient at 1%, 5%, and 10%
Observations
R-squared
Constant
Part. in education and training
Total hours worked
Gross fixed capital formation
Long-run unemployment
Compensation of employees
Secondary Education level
Economic activity rate
Dependent variable
Regressors
Absolute Upward Mobility: Q1Q5
Table 17 The table presents cross-sectional regressions
234
M. Battisti et al.
26.90∗∗∗
(9.656)
95
0.295
23.27∗∗
(9.017)
95
0.308
Mafia mean index
(1)
(2)
69.17∗∗
68.66∗∗
(27.02)
(27.51)
−0.319∗∗∗
−0.473∗∗
(0.112)
(0.185)
0.295
(0.239)
25.51∗∗
(9.999)
95
0.299
−28.05
(41.35)
(3)
72.71∗∗
(27.91)
−0.311∗∗∗
(0.113)
33.49
(27.04)
95
0.296
−0.231
(0.827)
(4)
71.42∗∗∗
(26.36)
−0.421
(0.389)
21.75∗∗
(9.851)
95
0.308
−30.5
(20.35)
(5)
81.25∗∗∗
(28.36)
−0.287∗∗∗
(0.109)
24.63∗∗
(9.667)
95
0.319
−131
(80.99)
(6)
75.93∗∗∗
(26.86)
−0.330∗∗∗
(0.112)
0.919
(0.814)
26.65∗∗∗
(9.341)
95
0.304
(7)
69.44∗∗
(26.65)
−0.426∗∗
(0.162)
All results are based on the baseline sample of 5-year averages. Each cell reports the coefficient estimates and robust standard errors in the parenthesis. ∗∗∗,
∗∗, and ∗ denote significance of the regression coefficient at 1%, 5%, and 10%
Observations
R-squared
Constant
Part. in education and training
Total hours worked
Gross fixed capital formation
Long-run unemployment
Compensation of employees
Secondary Education level
Economic activity rate
Dependent variable
Regressors
Relative Mobility
Table 18 The table presents cross-sectional regressions
Socio-Economic Inequalities and Organized Crime: An Empirical Analysis
235
28.57
(17.29)
95
0.172
22.33
(18.93)
95
0.184
Mafia rank index
(1)
(2)
164.2∗∗∗
163.3∗∗∗
(51.87)
(53.84)
−0.101
−0.365
(0.188)
(0.328)
0.506
(0.533)
29.48
(18.28)
95
0.172
18.45
(85.92)
(3)
161.8∗∗∗
(54.22)
−0.107
(0.193)
43.05
(62.19)
95
0.173
−0.507
(2.046)
(4)
169.1∗∗∗
(54.08)
−0.324
(0.925)
25.9
(18.16)
95
0.173
−15.81
(40.67)
(5)
170.4∗∗∗
(55.22)
−0.0845
(0.186)
24.97
(17.78)
95
0.19
−207.5
(145.3)
(6)
174.9∗∗∗
(53.24)
−0.118
(0.186)
−2.189
(1.776)
29.15
(17.66)
95
0.187
(7)
163.5∗∗∗
(52.59)
0.153
(0.304)
All results are based on the baseline sample of 5-year averages. Each cell reports the coefficient estimates and robust standard errors in the parenthesis. ∗∗∗,
∗∗, and ∗ denote significance of the regression coefficient at 1%, 5%, and 10%
Observations
R-squared
Constant
Part. in education and training
Total hours worked
Gross fixed capital formation
Long-run unemployment
Compensation of employees
Secondary Education level
Economic activity rate
Dependent variable
Regressors
Relative Mobility
Table 19 The table presents cross-sectional regressions
236
M. Battisti et al.
Socio-Economic Inequalities and Organized Crime: An Empirical Analysis
237
sitory component (see e.g., MaCurdy 1982) we would expect permanent shocks
(e.g., a technological shock that affects the need for unskilled workers) to affect
consumption and welfare because it harder to insure against them. In contrast, we
would not expect transitory shocks to affect consumption because individuals can
smooth those shocks by borrowing or using their assets. In practice, however, full
smoothing is infeasible due to the presence of borrowing constraints and other
imperfections of credit and insurance markets. For these reasons, we consider both
consumption and income inequality when we study their role in organized crime.
Interestingly, we find that consumption inequality much greater impact on organized crime than income inequality.
These results shed new light on the economic explanations of the rise and spread
of organized crime and suggest potential policy interventions. For example, the fact
that consumption inequality seems to matter more than income inequality, suggests
that what matters are differences in actual standards of living, which are better captured by consumption levels than by income levels as they depend on life-cycle
decisions (see e.g. Jappelli and Pistaferri 2010 for recent trends of income and consumption inequality in Italy). This directly points out a policy response in terms of
insuring adequate standard of living to the poor in order to reduce the existing disparities. The same holds for improving the socio-economic mobility, especially by
improving the perspective of those lagging behind the social ladder.
Conclusions
This study investigates the linkages between organized crime and inequality and
social mobility. In doing so we construct a novel dataset of organized crime at the
regional level based on two complementary approaches. The first one is based on
the methodology developed by Calderoni (2011) and the second one employs a
dynamic factor model. Additionally, we construct a wide range inequality as well as
social mobility measures. Our dataset is of general interest beyond the specific
application considered in the present study. Our main finding is that higher inequality can lead to higher organized crime development: in particular, the index that
better captures the effect of inequality is P90/P10. We also find that consumption
inequality performs better that income inequality as the relevant inequality measure.
Finally, we find that low socio-economic mobility displays a robust association with
organized crime development.
This is the first study analyzing the relationship between income inequality and
socio-economic mobility and organized crime. As such, it has obvious limitations.
In particular, although for the results on income inequality, especially those based
on GMM estimation, we can make a claim on causality running from inequality to
organized crime, for social mobility we cannot. The relationship between income
inequality and social mobility is a complex one, so that the dynamics of this relationship and its interaction with the emergence and spread of organized crime,
together with a precise identification of the significant channels at work remains to
be fully investigated. These topics are left to be explored in further research.
238
M. Battisti et al.
References
Acciari, P., Polo, A., & Violante, G. (2017). And yet, it moves’: Intergenerational mobility in Italy.
Mimeo NYU, New York.
Attanasio, O. P., & Pistaferri, L. (2016). Consumption Inequality. Journal of Economic Perspectives,
30(2), 3–28.
Bańbura, M., & Modugno, M. (2014). Maximum likelihood estimation of factor models on datasets with arbitrary pattern of missing data. Journal of Applied Econometrics, John Wiley & Sons,
Ltd., 29(1), 133–160. 01.
Barone, R., & Masciandaro, D. (2011). Organized crime, money laundering and legal economy:
theory and simulations. European Journal of Law and Economics, 32(1), 115–142.
Blundell, R., & Bond, S. (1998). Initial conditions and moment restrictions in dynamic panel data
models. Journal of Econometrics, 87, 11–143.
Caglayan, M., Flamini, A. and Jahanshahi, B. (2017). Organized crime and human capital DEM
working paper series nr. 143, Università di Pavia.
Calderoni F. (2011). Where is the Mafia in Italy? Measuring the presence of the Mafia across
Italian Provinces. Article published in Global Crime.
Chetty, R., Hendren, N., Kline, P., & Saez, E. (2014). Where is the land of opportunity? The geography of intergenerational mobility in the United States. The Quarterly Journal of Economics,
129(4), 1553–1623.
Coniglio, N. D., Celi, G., & Scagliusi, C. (2010). Organized crime, migration and human capital
formation: Evidence from the South of Italy. WP nr 28. Dipartimento: di Scienze Economiche
e Metodi Matematici-Universita di Bari.
Corak, M., & Heisz, A. (1999). The intergenerational earnings and income mobility of Canadian
men: Evidence from longitudinal income tax data. Journal of Human Resources, 34, 504–533.
Cowell, F. (2011). Measuring inequality. Oxford University Press. New York.
DIA. (2016). Relazione del Ministro dell’interno al Parlamento sull’attività svolta e sui risultati
conseguiti dalla Direzione Investigativa Antimafia. Roma. Available at: http://direzioneinvestigativaantimafia.interno.gov.it/page/relazioni_semestrali.html
Durlauf, S. (1996). A theory of persistent income inequality. Journal of Economic Growth, 1(1),
75–93.
Durlauf, S. (1999). The memberships theory of inequality: ideas and implications. In E. Brezis &
P. Temin (Eds.), Elites, Minorities, and Economic Growth. Amsterdam: North-Holland.
Durlauf, S. (2006). Groups, social influences, and inequality: A memberships theory perspective on poverty traps. In S. Bowles, S. Durlauf, & K. Hoff (Eds.), Poverty Traps. Princeton
University Press: Princeton.
Durlauf, S., & Seshadri, A. (2018). Understanding the great gatsby curve. NBER Macroeconomics
Annual, 32, 333–393.
Fajnzylber, P., Lederman, D., & Loayza, N. (2002). Inequality and violent crime. The Journal of
Law and Economics, 45(1), 1–39.
Fioroni, T., Lavezzi, AM and Trovato, G. (2017). Organized crime, corruption and poverty traps.,
in progress.
Franchetti, L. (1877). Condizioni politiche e amministrative della Sicilia (Vol. 1). G. Barbera.
Firenze.
Gambetta, D., & Reuter, P. (1995). Conspiracy among the many: The mafia in legitimate industries. In The economic dimensions of crime (pp. 99–120). UK: Palgrave Macmillan.
Garbinti, B., Goupille-Lebret, J., & Piketty, T. (2018). Income inequality in France, 1900–2014:
Evidence from Distributional National Accounts (DINA). Journal of Public Economics, 162,
63–77.
Güell, M., Pellizzari, M., Pica, G., & Rodríguez Mora, J. V. (2017). Correlating social mobility and
economic outcomes. Forthcoming Economic Journal.
Hertz, T. (2006). Understanding mobility in America. Center for American Progress Discussion
Paper.
Istat. (2010). Distribuzione del reddito e condizioni di vita in Italia.
Socio-Economic Inequalities and Organized Crime: An Empirical Analysis
239
Jappelli, T., & Pistaferri, L. (2010). Does consumption inequality track income inequality in Italy?
Review of Economic Dynamics, 13(1), 133–153.
Jong-Sung, Y., & Khagram, S. (2005). A comparative study of inequality and corruption. American
Sociological Review, 70(1), 136–157.
Lavezzi, A. M. (2014). Organised crime and the economy: a framework for policy prescriptions.
Global Crime, 15(1–2), 164–190.
Macours, K. (2010). Increasing inequality and civil conflict in Nepal. Oxford Economic Papers,
63(1), 1–26.
MaCurdy, T. E. (1982). The use of time series processes to model the error structure of earnings in
a longitudinal data analysis. Journal of Econometrics, 18(1), 83–114.
Moench, E., Ng, S., & Potter, S. (2013). Dynamic hierarchical models. Review of Economics and
Statistics, 95, 5.
Riccardi, M., Soriani, C., & Giampietri, V. (2016). Mafia infiltration in legitimate companies in
Italy. Organised Crime in European Businesses, 119.
Roodman, D. (2009). How to do xtabond2: An introduction to difference and system GMM in
Stata. Stata Journal, 9(1), 86–136.
Savolainen, J., Aaltonen, M., Merikukka, M., Paananen, R., & Gissler, M. (2014). Social mobility
and crime: Evidence from a total birth cohort. British Journal of Criminology, 55(1), 164–183.
Sharkey, P., & Torrats-Espinosa, G. (2017). The effect of violent crime on economic mobility.
Journal of Urban Economics, 102, 22–33.
Sunde, U., Cervellati, M., & Fortunato, P. (2008). Are all democracies equally good? The role of
interactions between political environment and inequality for rule of law. Economics Letters,
99(3), 552–556.
The Criminal Careers of Italian Mafia
Members
Ernesto U. Savona, Francesco Calderoni, Gian Maria Campedelli,
Tommaso Comunale, Marco Ferrarini, and Cecilia Meneghini
Introduction
This article draws its main results from the study of the criminal careers of Italian
mafia members, which is one of the innovative studies in project PROTON. The
analysis of criminal careers of mafia members covers the years from 1982 up to
2017. A long period that has allowed the researchers involved in the study to analyze the data related to the careers of mafiosi across two different levels of analysis:
their internal statistical significance and the transformations of mafias in Italy. This
article deals with the first level, introducing the second one in the conclusions and
postponing it to a larger analysis and publication.
After outlining why the analysis of the criminal trajectories of Italian Mafiosi
could contribute to the development of the theoretical framework of criminal
careers, this study explains the secondary data sources used, how these data could
fit with Blumstein et al.’ (1986) theoretical framework and how five of the six
Blumstein parameters have been operationalized through the available data on convicted mafia offenders in Italy. The chapter follows a Macro/Meso/Micro approach,
using the parameters to look at the criminal career of “Mafiosi” from different
points of view: the macro level aims at identifying the overall patterns of evolution
comparing them with existing knowledge on other serious offenders (section “The
Criminal Trajectories of mafiosi”). The meso level compares the types of mafias
“Mafiosi” belong to, exploring if and what are similarities and differences (section
“Similarities and Differences of Italian mafiosi Across Their Criminal
Organizations”). The micro level focuses on individuals, to examine the temporal
E. U. Savona (*) · F. Calderoni · G. M. Campedelli · T. Comunale · C. Meneghini
Università Cattolica del Sacro Cuore and Transcrime, Milan, Italy
e-mail: ernesto.savona@unicatt.it
M. Ferrarini
Business Intelligence, Milan, Italy
© Springer Nature Switzerland AG 2020
D. Weisburd et al. (eds.), Understanding Recruitment to Organized Crime
and Terrorism, https://doi.org/10.1007/978-3-030-36639-1_10
241
242
E. U. Savona et al.
and spatial dimension of mafia involvement, assessing what factors influence the
recruitment of mafia offenders into the organization (section “When, Why and
Where Do mafiosi Enter in Their Criminal Organization?”). Discussion and conclusions follow (section “Discussion and Conclusions”), framing the results of this
study in a better understanding of the criminal careers of serious criminals, as Italian
“Mafiosi” are, and the mechanisms that have driven their behaviors.
hy Italian Mafiosi? What We Can Learn from Their
W
Criminal Trajectory?
The demand for the dataset of the criminal careers of Italian mafiosi, as outlined in
the next section, was originated by the assumption that analyzing all the data of
Italian mafiosi convicted between 1982 and 2017 could have helped to explain the
processes of recruitment of mafia members in their organizations. The necessary
process of anonymization and the relevant missing values of many significant variables have moved these expectations towards two different research questions that
are collateral to the issue of recruitment. The former related to how the criminal
trajectories of Italian mafiosi fit with the theoretical framework of criminal career
conceived by Blumstein in 1986. The second, using Blumstein’s patterns, to how
these trajectories can explain the transformations of organized crime in Italy across
more than 30 years. In both cases the analysis of criminal trajectories of Italian
mafiosi can reveal something to researchers and policy makers for now and the
future. It could help, with better data, to refine the different trajectories of mafiosi
across the four criminal organizations in Italy, understanding similarities and differences, and discuss and interpret the transformations of mafias in Italy.
Merging Two Datasets: Variables and Their Robustness
This study relies on a new original dataset, the Proton Mafia Members dataset
(PMM). The PMM originates from two datasets provided by the Italian Ministry of
Justice: the Criminal Records Registry (Casellario dataset) and the Prison
Administration Department dataset (henceforth DAP dataset). Formal agreements
with the Ministry of Justice made the data available and guarantee the anonymity of
all individuals in compliance with current data protection and privacy regulations.
The Casellario dataset provided information on the criminal records for individuals
convicted for mafia offenses between 1982 and March 2017.1 The dataset included
The research team considered as mafia offenses the crime of mafia association and other offenses
aggravated by the mafia method (i.e.: Articles 416bis, 416ter, 418 of the Italian Criminal Code, and
special laws 575/1965, Art. 7 special law 152/1991 and Art. 7 special law 203/1991).
1
The Criminal Careers of Italian Mafia Members
243
182,867 offenses, with detailed information on the legislative source (e.g. Italian
Criminal Code), article number, and paragraph of the violated provisions. The
research team classified the offenses into 31 categories according to the characteristics of the crimes. The most recurrent categories were weapons and explosives (felonies), extortion, theft, drug-related crimes (i.e. illicit drugs production, trafficking
and selling), fencing, and mafia association (Savona et al. 2017a). The DAP dataset
contained socio-demographic variables, arrest and imprisonment data, information
related to the type mafia association (e.g. Cosa Nostra or ‘Ndrangheta), and the role
that mafia members held within their group (e.g. affiliate, boss).
The PMM dataset consists of a sample (n = 11,144) of mafia members. It provides socio-demographic data, information on the type of mafia group (i.e. mafia
association) and the role, as well as information on mafia members’ criminal career
(Table 1). In the PMM dataset each observation is a unique alphanumeric ID. The
research required several data cleaning and data transformation procedures to detect
and correct inaccurate records. Data preparation included imputation for missing
data to set up relevant variables for the analyses (Savona et al. 2017a). For instance,
the treatment of mafia association led to a more robust variable with missing values
reduced from 43% to 5%. Conversely, few other variables remained with an important amount of missing values, as the role of mafia members within their mafia
group (Table 1). The research team carefully considered this aspect to assess the
validity and inference of the analyses performed (2017).
The analysis of the criminal careers of Italian mafias’ members relies on the
conceptual framework of the criminal career paradigm developed by Blumstein
et al. (1986). A criminal career is defined as “the longitudinal sequence of offenses
committed by an offender who has a detectable rate of offending during some
period” (Blumstein et al. 1988, p. 2). Longitudinal data on offending throughout the
life course represent the ideal data to study the criminal career of individuals
(Farrington 1992). Longitudinal patterning of criminal activity can be investigated
using self-report and/or official data. Despite some limitations (see Piquero et al.
2003), official records can provide precise information about the timing of offences
through conviction data. This study seeks to investigate the criminal career of mafia
members through the analysis of unique conviction data contained in the PMM
dataset.
The analysis operationalizes five of the six parameters related to the criminal
careers framework, namely: participation, duration, frequency, specialization, and
escalation (Savona et al. 2017a).2 In the context of offending, participation refers to
“the proportion of a population who are active offenders at any given time”
(Blumstein et al. 1988, p. 3). Active offenders include both new offenders and existing offenders, i.e. individuals with previous criminal convictions (see Piquero et al.
2003). The analysis of the PMM dataset led computing two different participation
measures. External participation is the ratio between the number of mafia members
The intermittency parameter was discarded, as available data prevent identification of the prison
times served by mafia members.
2
244
E. U. Savona et al.
Table 1 Descriptive statistics for some variables in the PMM dataset (n = 11,144)
Variable
Sex
Country of birth
Religion
Education
Mafia association
Role
Mean age at first crime
Mean age at first mafia crime
Mean age at first arrest
Mean number of committed
crimes
Mean number of crime
categories
Mean number of violent
crimesa
Criminal careers’ parameter
Participation (internal)
Statistics
98% are males
98% are born in Italy
99% are Catholic
82% have between 5 and 8 years of education
37% belong to the Sicilian Mafia
65% are associates, 27% underbosses, 7% bosses
24.61
34.30
37.85
16.40
Missing
0%
0%
12%
18%
5%
56%
3%
16%
0%
0%
7.34
0%
3.42
0%
14.29 (avg. % of active offenders committing crimes
per year)
Duration
14.95 years
Frequency
1.52 crimes per year
Specialization (diversity index) 0.75
Escalation by age
4.84
Escalation by crime number
15.33
Most frequent categories (n = 182,867)
Weapons and explosives
17%
(felonies)
Extortion
9%
Mafia association
8%
Theft
7%
Murder
6%
NA
2%
11%
4%
25%
25%
NA
NA
NA
NA
NA
Violent crimes include murder, extortion, assault and violent offenses, and robbery
a
committing at least one crime in 1 year and the resident population aged 14 and over
living in the four Italian regions with a traditional mafia presence (i.e. Sicily,
Campania, Calabria, and Apulia). Internal participation is the ration between the
number of mafia members committing at least one crime in any year and the number
of potentially active members in the PMM dataset, i.e. individuals aged between 14
and 90 in the same year. The duration of a criminal career is the “length of time that
an offender continues to commit crimes once beginning an active criminal career”
(Rhodes 1989, p. 3). In the PMM dataset, the duration is the time span between the
first and the last recorded offence of each individual. The individual offending frequency refers to “the average number of crimes committed per year by active
offenders” (Farrington et al. 2016, p. 339). Among criminal offenders, ­specialization
The Criminal Careers of Italian Mafia Members
245
is “the tendency to commit the same type of crime” (Kyvsgaard 2002, p. 147). The
study assessed the specialization by resorting to the Diversity index.3 Finally, the
escalation parameter is the tendency to move to more serious offense types
(Blumstein et al. 1986). The study computed seriousness by considering the average
statutory penalty for each crime committed, due to missing data on the actual
imposed sentences. The escalations parameter is the coefficient of a linear regression of the seriousness of the crimes on a temporal measure. Two different temporal
measures were used: the escalation by age regresses the seriousness on the offender’s age, thus measuring the escalation as individuals age. The escalation by crime
regresses the crime seriousness on the progressive number offence in an individual’s
criminal career, focusing on the escalation as subsequent crimes are committed.
As in other studies relying on administrative data and criminal records, the operationalization of the five parameters required a long process of data cleaning.
Furthermore, the measurement of the variables (participation, duration, frequency,
specialization, and escalation) through available data implied complex choices that
have been explained in this section. The data have been used at the best of their possibilities and, the analytical framework that follows in the next section has been
chosen as the best framework for combining the phenomena analyzed, the research
questions and the data, including their limitations.
he Analytical Framework: Macro, Meso, Micro Dimensions
T
of the Criminal Careers of Italian Mafiosi
For the purpose of this study, we consider members of the Italian mafias all individuals who were convicted for a mafia offence (see footnote 1 above) and whose
conviction if final according to the Italian criminal justice system. This criterion is
certainly very restrictive, as it may exclude e.g. individuals with pending criminal
proceedings or whose cases were dismissed due to statute of limitations.
Nevertheless, the selection provides a clear threshold for delimiting the sample
population. The analysis of the criminal careers of Italian mafia members relies on
a three-level approach that focuses on their macro, meso, and micro dimensions.
The macro dimension analyses the whole sample of mafia members, focusing on
the identification of specific trajectories through Group Based Trajectory Modelling.
The goal of the first level is to identify overall patterns of evolution in the career of
3
m =1
The diversity index (DIi) for individual i is defined as DI i = 1 − ∑ pm( ) ∗ pm( ) , where m = 1, 2…31
31
i
i
are the 31 crime categories identified in the dataset and pm( ) is the proportion of offenses committed by individual i in the crime category m. The diversity index can be interpreted as the probability
that any two offenses drawn randomly from an individual’s set of offenses belong to two different
crime categories (Piquero et al. 1999). When DIi=0, offender i is completely specialised on one
type of crime. Conversely, a value of the index approaching 1 indicates that the offender engages
in a diversity of crime categories. Given the number of crime categories identified in the dataset,
the maximum value of the diversity index in this analysis is (31-1)/31 = 0.97.
i
246
E. U. Savona et al.
Italian mafiosi and compare them with existing knowledge on other serious offenders. The meso dimension focuses on the different types of Italian mafias, namely,
Camorra, Sicilian Mafia, ‘Ndrangheta, and Apulian mafia. Notoriously, Italy hosts
several mafias which differ under many aspects. The most popular Italian mafias are
the Sicilian Cosa Nostra, the ‘Ndrangheta (originating from the Calabria region),
the Camorra (from the Campania region) and the Apulian Sacra Corona Unita. Each
mafias has peculiar historical, cultural and organizational features (Berlusconi
2014; Paoli 2014). While Cosa Nostra and the ‘Ndrangheta are a confederation of
different groups, the Camorra does not constitute a confederation: “Camorra” is the
name employed to refer to independent gangs and criminal groups located in the
province of Naples and in the surrounding areas (Paoli 2014). The Sacra Corona
Unita was active in Apulia since the early 1980s, but the arrest of most of its members at the beginning of the current century led to its decline and to the emergence
of a variety of other criminal groups currently active in the region (Direzione
Investigativa Antimafia 2002; Europol 2013). Given the differences across the
mafias, the meso dimension explores the possible discrepancies across the criminal
careers of members of different mafias. The micro level dimension analyses the
dynamics and mechanisms of mafia involvement and careers at individual level,
providing information on how mafia members’ careers evolve. It can shed light on
the specific characteristics of the criminal careers of mafia members driving their
recruitment into the mafias.
The analyses of each dimension employed different quantitative techniques,
namely group-based trajectory modelling, regression models, and statistical correlation, using the criminal careers parameters as fundamental variables in all the
analyses. The analysis exploited available social and demographic variables, in
addition to the criminal careers parameters calculated for each individual in the
whole population. Further details on the data sources, the data cleaning and the
computation of the parameters of the criminal careers are available in the research
report of Project PROTON (Savona et al. 2017a).
While it is the first time that this type of analysis if conducted on the Italian
Mafiosi, relying on a large and original dataset provided by the Italian Ministry of
Justice, the data have a few limitations. First, the analysis focused only on final
convictions, to precautionarily include only crimes whose commission was finally
established by the courts. In the Italian criminal justice system, a conviction is final
only when the deadline for filing an appeal in a higher court has expired, or when
there are no higher courts to appeal to. The law gives the defendant and the prosecution the possibility to appeal the judgement of the tribunals, and appeal decisions
can be further challenged before the Corte di Cassazione (the Italian supreme court
for civil and criminal cases). This process may take several years, depending on the
type of offence and the resources available to the parties. Given the seriousness of
the possible penalties, mafia-related criminal proceedings are often likely to go
through three separate decisions, and even more (e.g. the supreme court may quash
an appeal judgement and order a new appeal trial, which might be further challenged before the supreme court). As a result, the most recent period in the sample
is underrepresented as many proceedings are likely still pending. Therefore, our
The Criminal Careers of Italian Mafia Members
247
results are mostly representative of the mafia members’ population convicted
between the 1980s and the 2000s and have very limited application to the most
recent years. Second, the PMM lacks some important information which may be
useful for examining the criminal careers of mafia members. For example, there is
no information about the imposed penalties for each crime and consequently it is
impossible to reliably determine the prison time served by each individual. Third,
the PMM does not provide data on co-offending (whether two or more criminals
were convicted for the same offence), nor on the affiliation to specific mafia family
or clan. Due to this lack of information it was impossible to explore the criminal
career patterns in relation to the dynamics of specific criminal groups.
The Criminal Trajectories of Mafiosi
The interest over the developmental evolution of criminal involvement has attracted
the attention of many scholars in the last decades. Researchers have applied Group
Based Trajectory Modelling (henceforth GBTM) as the most common statistical
technique for investigating individual and collective trajectories of crime across
criminal samples of different nature. In a landmark paper, Laub and co-authors
(1998) have relied on longitudinal data collected by Glueck and Glueck (1968) to
analyze the criminal trajectories of juvenile delinquents. In their study, they have
demonstrated how desistance from crime is facilitated when individuals engage in
quality marital bonds, moreover highlighting how this positive influence is gradual
and cumulative over time. Similarly, Blokland and Nieuwbeerta (2005) have proved
how marriage and other life circumstances can have individual effects on the development of criminal trajectories over time, using a sample of Lussier (2010) and
colleagues have instead focused on sexual crimes. They have studied a quasi-­
population of convicted adults in Quebec and detected four different offending trajectories. Their analysis stressed the difference across groups in terms of age of
onset, frequency, diversity and specialization, thus contesting the idea that sex
offenders have stable and linear profiles. Employing a nationally representative
sample of Dutch men convicted in 1977, van de Rakt et al. (2012) have concentrated
on the effects of paternal imprisonment on criminal trajectories of children, finding
a mixed relationship between fathers’ imprisonment and child convictions. In fact,
paternal imprisonment does not alter the shape of development of a criminal career
but it alters the height of a criminal trajectory. Additionally, authors found that children whose fathers were convicted before they were 12 years old had a higher probability of imprisonments in the age between 18 and 30.
Applications of GBTM to more serious forms of crime, as white-collar crime or
organized crime, is rarer. Among the few examples, van Onna and colleagues analyzed the criminal career profiles of a sample of white-collar criminals (2014),
showing four different types of criminals with consistent patterns also in terms of
selection offence characteristics and sociodemographic background. Van Koppen
et al. (2010) investigated the existence of specific longitudinal trajectories for a
248
E. U. Savona et al.
sample of 854 Dutch organized criminals. Also in this case, the study identified four
distinct groups holding specific features. Both these studies shed light on the existence of late onset mechanisms for serious offenders. Specifically, Van Koppen and
co-authors point out how the insufficient attention on late onset can be explained by
the high attention given to youth samples in criminal trajectories literature and by
the interest on high volume crime in which adult-onset is scarce. Contrarily, studies
on white collar and organized crime highlight the presence of subgroups of individuals who start to engage in crime in their adult age following dynamics which
Kleemans and de Poot tried to explain through the theoretical framework of social
opportunity structure (2008). However, in spite of the wide interest of criminologists for the study of criminal careers over time, no research existed on the trajectories of mafia members to date. To the best of our knowledge, this is the first
comprehensive analysis of the criminal trajectories of Italian mafia members.
In this study, we apply GBTM to the criminal career of Italian Mafiosi. Group
Based Trajectory Modelling (henceforth GBTM) is a statistical technique that aims
to detect different subpopulations that share common offending trajectories over
their careers and detect significant patterns (Jones and Nagin 2013). Technically,
GBTM is a specialized form of finite mixture modelling employed to analyze developmental trajectories measuring a specific outcome over certain time periods, and
has been extensively applied in Criminology (see Nagin, 2016). In the present study,
the outcome (i.e. the dependent variable) is represented by the number of offenses
committed by an individual at a given age. Relying on the age as temporal dimension (instead of the years) allows to position all the individuals in the dataset at the
same starting point. We adapted the PMM data for the use of GBTM through two
strategies. First, the time-span covers crimes committed by Italian mafiosi from age
14 to age 60.4 Second, we censored the maximum number of offence per year setting it at 15. This figure is reasonably high, as it is close to mafia members’ average
number of offences across the whole career, and allows for a correct computation of
the models.5
The analysis of the trajectories within the mafia members population (n = 11,144)
led to the identification of five different groups that reflect distinct developmental
and criminal patterns (Fig. 1). We labelled the trajectories as High Frequency
Offenders (HFO), Low Frequency Offenders (LFO), Moderate Persistence Offenders
(MPO), High Persistence Offenders (HPO), and Early Starters (ES).
Each trajectory group holds specific features (Table 2). High Frequency Offenders
(10.33% of the sample) start early and reach their criminal peak at age 30. As
Some mafia members in the PMM still commit offences after age 60. However, considering the
lack of information on the death date and the technical problem of high singularity of the matrix
(the high occurrence of zero offences for the years from age 55 to age 75), the dataset was censored
to age 60.
5
Indeed, at a first stage the absolute variance of the entire matrix was too high for the correct computation of the models. Some individuals committed more than 100 offences in a single age/year,
while zeros accounted for 75% of the cells of the matrix after the computation (98% before temporal censoring).
4
The Criminal Careers of Italian Mafia Members
249
Fig. 1 Criminal trajectories of mafia members (n = 11,144)
Table 2 Descriptive statistics of mafia members’ trajectories
Group
High frequency
offenders
Low frequency
offenders
Moderate
persistence
offenders
High persistence
offenders
Early starters
Overall
N of
individuals
1151
(10.33%)
3803
(34.13%)
2408
(21.61%)
961
(8.62%)
2821
(25.31%)
11,144
(100.00%)
Avg age at Avg N of Avg
first crime crimes
duration
20.52
39.51
17.68
Avg
frequency
3.21
Avg
seriousness
80.63
32.66
5.59
10.79
0.94
125.63
21.00
19.71
20.00
1.13
71.75
22.78
33.27
29.06
1.34
65.66
19.72
13.01
10.01
1.83
86.38
24.61
16.41
14.95
1.53
94.23
s­ uggested by the label, they exhibit the higher frequency overall and they are also
the most active in general, showing the highest average number of crimes committed. Conversely, Low Frequency Offenders report the lowest frequency and average
number of crimes committed. Their criminal activity is low and almost stable for the
entire course of their lives. Nevertheless, they tend to commit few but very serious
offences, considering that their average seriousness is the highest overall. Moderate
Persistence Offenders reach their highest criminal activity at age 28, moderately
persisting over their careers. Indeed, they converge towards zero at age 50. Their
250
E. U. Savona et al.
duration is above the average and they also tend to engage in crime early. High
Persistence Offenders show a sinusoidal trend over time. The most notable feature
is that they tend not to desist in the adult age: they exhibit their criminal peak at age
45, when most mafia members are not active anymore (due to desistance or incapacitation). Consequently, High Persistence Offenders have on average the longest
careers, but tend to commit the least serious crimes overall. Finally, the Early
Starters are mafia members who start their criminal careers at the youngest age. At
age 23 they reach their criminal peak, rapidly followed by a steep decrease. Their
trajectory converges towards the zero early (age 38), probably as a consequence of
an incapacitation effect linked to the high risk of conviction that unexperienced
young members face in their early careers.
The results are mostly in line with previous literature (Onna et al. 2014; Van
Koppen et al. 2010). Indeed, both studies identified the same number of groups (i.e.:
4) with similar trajectories shapes, with at least one group of low frequency offenders. Moreover, an early onset group is often related to higher frequencies while low
frequency offenders are associated to a later onset age. These findings point out
how, regardless of the specific type of criminal activity, mafia member seem to follow developmental trajectories similar to other serious criminals. The explanation
for this result may be found into future research on the underlying mechanisms that
push individuals to criminal activities at certain stages of their lives.
imilarities and Differences of Italian Mafiosi Across Their
S
Criminal Organizations
The research team assessed the differences across the careers of the members of the
four main types of Italian mafias: the Sicilian Mafia, the Camorra, the ‘Ndrangheta,
and the Apulian mafia. These four mafias differ in terms of criminal interests, organizational structure, modus operandi and reactions against the State action. Such
differences might cause the criminal career of their mafia members to follow distinctive paths, thus justifying the analysis of mafia members’ criminal careers at the
meso level (by type of mafia organization).
To explore whether the criminal careers of members belonging to different
mafias are significantly different, the analysis relied on the mafia association
variable. Originally, this variable was missing for 43.07% of mafia members.
However, the analysis exploited information on the mafia member’s province of
birth and on the region where mafia organizations are rooted to significantly
reduce the amount of missing data. First, mafia organizations were grouped by
Italian region.6 Second, individuals with a missing mafia association value but
A new variable (mafia association aggregated) was created by grouping the different values of
mafia association by Italian region. This resulted in five categories for mafia association aggregated: “‘Ndrangheta” (grouping members of ‘Ndrangheta and Other Mafias Calabria), “Sicilian
Mafia” (grouping members of Cosa Nostra, Stidda and Other Mafias Sicily), “Camorra” (consist6
The Criminal Careers of Italian Mafia Members
251
who were born in provinces with an established and predominant mafia group
were imputed this mafia group as mafia association.7 For example, 99.49% of
mafia offenders born in the province of Naples (and with a non-missing mafia
association value) are Camorra members, while 99.67% of offenders born in the
province of Reggio Calabria are ‘Ndrangheta members. 1314 mafia offenders
born in Naples and with a missing mafia association value were imputed
“Camorra” as mafia association, while 700 offenders born in Reggio Calabria
and with missing mafia association were coded as ‘Ndrangheta members.
Overall, the imputation reduced missing values from 43.07% (n = 4800) to 5.35%
(n = 596), thus allowing a more robust analysis of the similarities and differences
of the criminal careers of members of different mafia organizations.
The analysis of the trend in the number of offenses committed by members of
different mafia organizations reveals the presence of some meso-level differences
(Figs. 2 and 3). The analysis focuses on the number of crimes committed after 1982,
the year in which the mafia association crime was introduced in the Italian Penal
Code.8 In each year considered, most recorded offenses are committed by either
Camorra or Sicilian Mafia members. Despite the evidence on the dimension and
expansion of the ‘Ndrangheta in recent years (Ciconte 2014), crimes committed by
this mafia organization represent a minor share throughout the years 1982–2016.
This could be a consequence of the family structure characterizing the ‘Ndrangheta,
which leads to very few pentiti and guarantees secrecy and power to this mafia organization (Serenata 2014). At the same time, the underestimation by the Italian State
of the power and influence of the ‘Ndrangheta allowed its expansion abroad, especially when law enforcement authorities had their eyes on the Sicilian Mafia after
the murder of two anti-mafia judges in 1992 (Ciconte 2014).
Between 1984 and 1997, the Sicilian Mafia was the mafia organization registering more final convictions, while from 1997 onwards the share of offenses committed by members of the other mafias (especially Camorra members) acquires a
greater importance. This finding corroborates the view that the intensification of law
enforcement action that followed the “terrorist” mafia attacks in 1992–1993 led to a
decline in the power of the Sicilian Cosa Nostra (Paoli 2008). Indeed, the trend in
ing of Camorra members), “Apulian Mafia” (grouping members of Sacra Corona Unita and Other
Mafias Apulia) and “Mafia Lucana” (consisting of members of Mafia Lucana). Results for “Mafia
Lucana” are not presented in the following analysis as only 28 offenders in the dataset are members of this mafia organization, thus impeding to draw comparable conclusions on their criminal
career’s patterns.
7
For each Italian province where the number of mafia members born in that province was higher
than 100, the relative frequencies of the mafia groups (values of mafia association aggregated)
were calculated. If the relative frequency of a mafia group within a province was greater or equal
than 85%, that value was imputed into a new variable named mafia association aggregated clean
for all individuals born in that Italian province.
8
The sample includes n = 129,571 offenses out of the total 182,867 offenses in the PMM dataset.
This discrepancy is due to two reasons: firstly, offenses committed before 1982 or with missing
year are excluded from these charts. Secondly, offenses with a missing value for the mafia association variable (after the data imputation) are excluded as well.
252
E. U. Savona et al.
Fig. 2 Percentage of offenses committed by mafia association (on the total number of offenses
committed by mafia members, n = 129,571)
Fig. 3 Number of offenses committed by mafia association per year (n = 129,571)
the total number of offenses committed per year by the Sicilian Mafia (Fig. 3) displays a marked peak in 1991 followed by a sharp decline in the following years.9 On
The drop in the number of crimes committed by all mafia organizations in more recent years
(approximately from 2007 onwards) might be influenced by the fact that the dataset contains information on mafia members’ final convictions. In Italy, proceedings for mafia-related offenses often
last many years before reaching a final judgment. For example, the analysis of the data from the
9
The Criminal Careers of Italian Mafia Members
253
Table 3 Descriptive statistics of the criminal career’s parameters and variables in the four Italian
mafia organizations
Participation (internal)∗
Participation (external)∗
Duration
Frequency
N violent crimes
Specialization
Mean crime seriousness
Escalation (by crime number)
Escalation (by age)
Number of individuals
Type of mafia organization
Apulian mafia ‘Ndrangheta
18.81%
11.17%
0.0083%
0.0104%
15.46
13.55
(9.81)
(11.46)
1.71
1.42
(1.53)
(1.79)
2.91
2.16
(4.77)
(4.01)
0.81
0.72
(0.10)
(0.14)
74.45
107.28
(37.59)
(60.09)
13.90
10.95
(36.44)
(47.64)
5.80
3.39
(18.36)
(20.80)
1625
1710
Camorra
15.17%
0.0096%
15.40
(10.55)
1.53
(2.07)
3.83
(6.16)
0.77
(0.12)
86.73
(44.89)
16.85
(39.49)
5.52
(17.51)
3234
Sicilian Mafia
13.11%
0.0120%
15.00
(11.09)
1.46
(2.02)
3.78
(7.34)
0.74
(0.14)
104.76
(54.92)
16.84
(44.43)
4.34
(17.35)
3951
Notes: standard deviations reported in parenthesis. aFor internal and external participation, the
average participation over time (1982–2016) is shown. For all the other variables, the average
across individual level values is presented. ANOVA tests have been run for all the individual level
variables, revealing statistically significant differences (at the 0.1 per cent level) across different
mafia organizations for all of them
the other hand, the number of crimes committed by Camorra and Apulian mafia
members exhibits a similar peak in the early 1990s but remains quite sustained in
the following years.
The variables and parameters describing mafia members’ criminal careers present statistically significant differences in their mean values across mafia organizations (Table 3). Nonetheless, the distributions of the parameters in the four mafia
organizations are visually very similar (Savona et al. 2017a). Italian mafia organizations share some specific features that distinguish them from other types of criminal
organizations, such as the ability to control legitimate markets and the exertion of
political dominion over the areas of settlement (Paoli 2014). However, the documented differences in the criminal careers of members of different Italian mafia
organizations seem to underline some disparities in the criminal interests and modus
operandi, which likely relate to the historical development of such criminal
organizations.
Casellario shows that on average Italian courts issue definitive judgments (i.e. irrevocable sentences) 6 years after the commission of the mafia association crime.
254
E. U. Savona et al.
A general analysis of the variables and parameters defining mafia members’ criminal
careers in the four main Italian mafia organizations allows to grasp some of the underlying differences across these organizations. On average, Apulian mafia members exhibit
the most intense criminal careers: they have the longest careers, the highest offending
frequency and they are the most versatile offenders. They also display the highest mean
internal participation, indicating that on average a higher share of Apulian mafia members are active offenders over the period 1982–2016. Moreover, Apulian mafia members
exhibit the highest escalation by age, while Camorra and Sicilian Mafia members appear
to have on average the highest escalation by crime number. Despite presenting such
intense criminal careers, Apulian mafia members commit on average less serious
offences compared to members of all the other mafia organizations. The Apulian mafia
experienced the greatest expansion between the 1980s and 1990s, after which it faced
many arrests, trials and defections, which caused it to implement a strategy of violent
conflict against the State and other criminal organizations (Massari 2014). Moreover,
contrary to other mafia organizations, recruitment procedures in the Apulian mafia are
not based on biological-parental principles, causing offenders who seek to gain a leading
role in the organization to resort to violence, murder and other coercive tools to move up
the command hierarchy and maintain their position of power (Massari 2014).
The criminal careers of members of other mafia organizations seem to evolve differently. ‘Ndrangheta and Sicilian Mafia members are the most serious offenders in
terms of the average seriousness of committed crimes. Compared to members of
other mafia organizations, ‘Ndrangheta members have shorter careers and commit
crimes at lower frequency, but the average seriousness of committed offences is the
highest (despite not focusing on the perpetration of violent crimes). Their lower escalation values suggest that ‘Ndrangheta members commit more serious offences since
the early years of their criminal career. On the other hand, Camorra and Sicilian
Mafia members have on average more violent careers. The mean criminal career’s
duration and frequency for members of the Camorra and Sicilian Mafia is close to the
overall average, but the mean number of violent crimes committed is especially high.
It is hard to infer conclusions from this analysis where similarities and difference
across the four criminal organizations say very little. Further exploration with more
specific examination of the groups and better data may provide better insights into
specific characteristics of criminal careers within specific types of mafias. Individual
patterns as outlined in the next section could contribute to this analysis.
hen, Why and Where Do Mafiosi Enter in Their Criminal
W
Organization?
From a micro-level perspective, the study investigates the temporal and spatial
dimension of mafia involvement, trying to determine what factors influence when
and where mafia offenders enter in their criminal organization. Whereas more information is available as regards the age of entrance into the mafia organization, less
The Criminal Careers of Italian Mafia Members
255
can be inferred with respect to the spatial dimension of mafia involvement. A close
examination of the differences between “early recruits” and “late recruits” allows to
analyze some of the factors leading to mafia involvement, thus providing an exploratory answer as to why offenders enter in their mafia organization.
In line with previous studies on organized crime offenders (Francis et al. 2013;
Kleemans and de Poot 2008), the criminal career of Italian mafiosi tends to start at
a quite late age compared to what has been found in samples of common criminals:
on average, Italian mafia members commit their first crime at the age of 25 (median
age is 22). However, their entrance in the mafia organization (marked by their first
mafia association offense) usually occurs at an even later stage, being on average at
the age of 34 (median age is 33).10
At the individual level, the age of entrance into the mafia organization varies
significantly across the sample. While some members join the mafias as young
adults, other enter at later ages. To explore the characteristics influencing an early or
a late entrance into the mafia, the sample has been divided into three groups according to the distribution of the variable for the age of entrance into the mafia. More
specifically, offenders whose age at mafia entrance is lower or equal than the 25th
percentile of the distribution (27 years old) are classified as “early recruits”, while
offenders who entered the mafia at an age equal or higher than the 75th percentile
of the distribution (40 years old) are identified as “late recruits”. Drivers of early and
late recruitment are assessed through multinomial logistic regressions where the
dependent variable is the categorical variable dividing the sample in “early recruits”,
“late recruits” and offenders who joined the mafia at an “average” age (the baseline
category) (Table 4).11 In the first specification (the first and third column of Table 4),
the included predictors are the criminal career’s parameters, the number of violent
crimes committed and the mean seriousness of committed crimes. In the second
specification (the second and fourth column of Table 4), the model aims to detect
whether early and late recruits committed different types of crimes before entering
the mafia organizations. For this purpose, the included predictors are the number of
crimes committed under certain groupings of the crime categories.12 Moreover, all
specifications include the years of education as regressor and control for the year of
birth and the type of mafia association.
The year of the first mafia association offence is employed as a proxy for the timing of entrance
into the mafia organization. This methodological choice may present some flaws linked to the
imprecision of the year of crime variable and to the possibility that mafia offenders committed
some mafia association crimes at younger ages that might have gone undetected by law enforcement authorities. Nonetheless, some robustness checks relying on building time-buffers that
“move” the year of recruitment to 1, 2 and 3 years before and after the year of the first mafia association crime showed that the choice of this last variable as year of entrance into the mafia organization is fairly robust (Savona et al. 2017a).
11
Most results are robust to the change in the age limit defining “early” and “late” recruits (Savona
et al. 2017a).
12
Crimes have been grouped through a Principal Component Analysis that enabled to identify
relevant correlations across the 31 crime categories and reduce them into six groupings (Savona
et al. 2017a).
10
256
E. U. Savona et al.
Table 4 Drivers of early and late recruitment: multinomial logistic regressions
‘Ndrangheta
Camorra
Sicilian Mafia
Mean serious. pre MO
Duration pre MO
Frequency pre MO
Escalation pre MO
Specialization pre MO
N violent crimes pre MO
N long conviction crimes pre MO
N robbery, theft and related crimes
pre MO
N arson and assault crimes pre MO
N drug-related crimes pre MO
N admin, financial, road traffic
crimes pre MO
N white-collar crimes pre MO
N associative crimes pre MO
Years of education
Year of birth
Intercept
Pseudo R2
Base outcome is the average recruitment age (28–
39 years old)
Early recruits (<28 years
Late recruits (>39 years
old)
old)
−0.275
−0.486
0.474
0.174
(0.251)
(0.156)∗∗
(0.226)∗
(0.168)
0.270
−0.047
0.157
−0.089
(0.172)
(0.122)
(0.191)
(0.151)
−0.146
−0.455
0.645
0.434
(0.172)
(0.113)∗∗∗
(0.181)∗∗∗ (0.140)∗∗
−0.007
0.004
(0.002)∗∗
(0.002)
−0.492
−0.358
0.275
0.168
(0.028)∗∗∗ (0.014)∗∗∗
(0.015)∗∗∗ (0.008)∗∗∗
0.115
0.191
(0.070)
(0.110)
0.003
−0.011
(0.003)
(0.005)
1.961
−1.588
(0.504)∗∗∗
(0.442)∗∗∗
0.014
−0.069
(0.025)
(0.020)∗∗∗
0.001
−0.021
(0.009)
(0.008)∗∗
0.158
−0.197
(0.016)∗∗∗
(0.018)∗∗∗
0.132
−0.076
(0.030)∗∗∗
(0.033)∗
−0.119
0.090
(0.039)∗∗
(0.031)∗∗
0.071
−0.035
(0.029)∗
(0.013)∗∗
−0.311
0.170
(0.077)∗∗∗
(0.054)∗∗
0.423
−0.292
(0.123)∗∗∗
(0.105)∗∗
−0.075
−0.080
0.105
0.090
(0.027)∗∗
(0.017)∗∗∗
(0.022)∗∗∗ (0.016)∗∗∗
0.113
0.134
−0.162
−0.182
(0.010)∗∗∗ (0.007)∗∗∗
(0.010)∗∗∗ (0.007)∗∗∗
−218.770
−262.035
311.177
354.273
(19.333)∗∗∗ (13.258)∗∗∗ (19.290)∗∗∗ (13.713)∗∗∗
0.521
0.475
0.521
0.475
(continued)
The Criminal Careers of Italian Mafia Members
257
Table 4 (continued)
Observations
Base outcome is the average recruitment age (28–
39 years old)
Early recruits (<28 years
Late recruits (>39 years
old)
old)
3396
5972
3396
5972
Notes: standard errors reported in parenthesis. “MO” refers to the first mafia offence. ∗, ∗∗ and ∗∗∗
indicate statistical significance at the 5, 1 and 0.1 per cent level, respectively. Early recruits are
offenders whose age at the entrance into the mafia organization is lower than the 25th percentile of
the distribution of the age at entrance into the mafia organization, while late recruits’ age at
entrance into the mafia is higher than the 75th percentile. Base outcome for the mafia association
is the Apulian mafia
Early recruits tend to have completed less years of education compared to offenders who joined the mafia at an “average” age, while late recruits are on average more
educated. This result is robust to the two different specifications reported in Table 4
and it is not driven by a temporal trend to recruit younger (and more educated)
offenders, as all models control for the offender’s year of birth. The positive relationship between years of education and age at first mafia offense might have different explanations. More educated offenders may be better able to hide their criminal
behavior to law enforcement authorities, which did not detect some mafia association crimes they committed while they were younger. It might also be that offenders
with higher education face more career options, and thus commit to the involvement
into the mafia organization at a later stage. Given that a higher education is associated with a late entrance into the mafia organization, the educational background
appears to be a factor influencing the recruitment into the mafia, as suggested by
other studies on organized crime (Albini 1971; Carvalho and Soares 2016; Ciconte
1992; Hess 1993; Sales 2015). This literature indicates that illiterate people from
lower socio-economic background are more likely to join organized criminal groups
(see Savona et al. 2017b). Official reports of Italian anti-mafia institutions also cite
the relation between poor education, low economic conditions and scarce access to
legitimate jobs as risk factors for youths’ involvement in the mafias (Commissione
Parlamentare Antimafia 2012; Direzione Investigativa Antimafia 2002).
Two specific criminal features characterize early recruits compared to offenders
who joined the mafia at an “average” age: early recruits were on average more versatile in the type of crimes committed before entering the mafia organization, and
they committed on average less serious offences. Conversely, compared to offenders
who joined the mafia organization at an “average” age, late recruits committed a
lower number of violent crimes before entering the mafia and they were less versatile offenders. Hence, the propensity to commit different types of offences appear to
be a relevant criminal feature influencing the timing of entrance into the mafia
organization.
Compared to the baseline group, early and late recruits are characterized by
sharp differences in the type of crimes committed before joining the mafia organization. Offenders who, before joining the mafia, committed more robbery, theft and
258
E. U. Savona et al.
related crimes, more arson and assault crimes, more administrative and financial
crimes and more associative crimes13 tend to enter the mafia organization at younger
age. Conversely, offenders committing (before the first mafia association crime)
more drug-related crimes and more white-collar crimes join the mafia organization
on average at a later age.
Turning to the spatial dimension of mafia involvement, available data highlight
that Italian mafia organizations are rooted in specific Italian provinces and regions.
The province of birth is a strong predictor of the type of mafia organization that
offenders will join: for example, of 417 offenders born in the province of Caserta (in
the Campania region) and for whom the mafia association is known, 99.52%
(n = 415) belong to the Camorra.14 Moreover, the great majority of offenders
(84.45%) reside in the region of birth, thus suggesting that most offenders are
recruited in the region where they were born. Nonetheless, some mafia organizations appear to be more prone to relocate their criminal activities outside the region
where they are traditionally rooted. Compared to other mafia members, ‘Ndrangheta
members are significantly more likely to reside in a region different from the one
where they were born, while the opposite is true for Sicilian mafia members.15
The micro level analysis of mafia members’ criminal careers highlighted that
violent and versatile offenders with less years of education tend to enter the mafia
organization when they are younger. Offenders are usually recruited in the province
or region of birth. These findings offer valuable insights for designing specific crime
prevention strategies tailored to individuals who are more likely to be recruited into
the mafia.
As a complementary although separate exploration, the study explored the differences in the criminal career of mafia members before and after the recruitment
into the mafias. The moment of recruitment was operationalised as the year of the
first mafia association offence in each individual’s criminal career. To this aim, the
analysis focused solely on the subset of individuals with sufficient and reliable
information on the mafia association offenses (n = 5993).16
As a preliminary analysis the dimensions of the criminal career (duration, frequency, specialization, escalation, number of crimes, and average seriousness) were
computed for both periods before and after recruitment (Table 5).17 The statistical
“associative crimes” excludes the mafia association crimes, thus grouping together the crimes of
“criminal association” and “drug trafficking criminal association”.
14
These statistics refer to the mafia association variable before data imputation, see Section 6 for
more details.
15
These considerations arise from logistic regression models having as dependent variable the
offender’s mafia association (Savona et al. 2017a, p. 227).
16
The initial 11,144 mafia members were filtered based on the number of crimes they committed,
maintaining in the sample only those members who committed at least four crimes. For each member was then computed the probability that crimes with no year were the first or last crimes of the
member’s career. These two passages lowered the sample size from 11,144 to 5993.
17
To test the robustness of the choice of the year of the first mafias offence as a proxy for the
recruitment year, we calculated the distributions of the dimensions moving the recruitment moment
backwards in time of 1, 3 and 5 years. The analyses focused on those members with information
13
The Criminal Careers of Italian Mafia Members
259
Table 5 Mean values of the criminal career’s parameters of mafia members before and after
recruitment
Number of
Duration Frequency Specialization Escalation crimes
Before 11.74
1.40
0.67
6.36
10.46
After
9.50
1.74
0.64
−5.39
7.74
Average
seriousness
57.27
82.70
significance of the differences before and after recruitment was assessed with
T-tests, showing that escalation is significantly lower after recruitment and the average seriousness is significantly higher. This suggests an escalation in the criminal
pattern of mafia members before recruitment, followed by more serious offenses
after the recruitment moment.18
The average seriousness shows an almost constant escalation in the years before
recruitment, followed by an almost symmetric de-escalation (Fig. 4). A very similar
situation is found by the average number of crimes (Fig. 5). These trends suggest
that in the years before commission of the first mafia offence, the individuals in the
sample are already engaged in criminal activity, with a slight increase in the years
immediately before the mafia offence. Yet the offences’ seriousness is increasingly
higher, suggesting that on average the individuals in the sample may go through a
pattern of “criminal training” before entering the mafias. Surprisingly, after entrance
in the mafias, the criminal activity de-escalates both in terms of number of offences
and seriousness. Nevertheless, this second pattern could be biased due to the limitations of the data. For example, it is likely that investigations for mafia offences
entail pretrial detention or conviction sentences. These prison time for mafia association and other serious crimes likely account for an important part of the de-­
escalation after recruitment. Prison time certainly reduces the offending capacity of
the mafia members, which in turn depresses the average values of the population.
While the data lack detailed information on the actual detention periods, the criminal career of a given mafia member includes both years with committed crimes
(active years), and years with no criminal records (silent years). To analyze the
effect of the silent years on the results, a more specific test focused on the active
years only. Starting from the year of recruitment t0, each step backwards/forwards
represents the previous/following year in which the mafia member was “active”, i.e.
committed at least one crime. Contrary to the analysis across time, which comprises
periods of both criminal activity and inactivity, the analysis across active years only
accounts for periods of criminal activity.
Indeed, the after-recruitment behaviour clearly differs when analysing the seriousness over active years (Fig. 6). After increasing before recruitment and peaking
about all the six different dimensions, and on the four time-buffers defined for 0, 1, 3 and 5 years.
The correlation was computed, for each dimension, before and after recruitment, and across the
time-buffers. Results show strong correlations on average, pointing out the robustness of the
choice. Further details about the robustness checks are in (Savona et al. 2017a).
18
The offence of mafia association is excluded from the calculation of the seriousness, as it would
have increased the average seriousness score for all mafia members.
260
E. U. Savona et al.
Fig. 4 Average seriousness before and after recruitment, across both active and silent years. t0
represents the year of recruitment
Fig. 5 Average number of crimes before and after recruitment, across both active and silent years.
t0 represents the year of recruitment
in the year of recruitment, the average crime seriousness stabilises. Removing periods of inactivity (likely to include prison time) uncovers that the seriousness of
crimes after recruitment maintains higher levels than before recruitment. Similarly,
the analysis of the average number of crimes across active years confirms the escalation before recruitment, but points up a slight increasing number of crimes after
recruitment (Fig. 7).
Given the establishment of a high level of seriousness after the recruitment
moment, the next issue to be addressed was how the number of crimes changed
(before and after recruitment) across crime categories. Descriptive statistics show
that recruitment into mafias induce a drop in some low-seriousness categories such
The Criminal Careers of Italian Mafia Members
261
Fig. 6 Average seriousness before and after recruitment, across active years. t0 represents the year
of recruitment
Fig. 7 Average number of crimes before and after recruitment, across active years. t0 represents
the year of recruitment
as financial offences, robbery and theft, overcompensated by (i) the appearance of
mafia association offenses, and (ii) a rise in high-seriousness categories such as drug
trafficking and criminal association, and extortion (Fig. 8).
Overall, the analysis of the seriousness and number of crimes before and after
recruitment shows a remarkable escalation. Mafia members increase their offending
frequency and particularly the seriousness of the offenses. The path to mafia recruitment suggests that, on average, candidates need to show their criminal skills to be
admitted in the organization. Recruitment impacts significantly on mafia members’
offending patterns. The number of crimes, when considering only active years, continues to escalate, while the seriousness stabilises at high levels. Recruitment into
262
E. U. Savona et al.
Fig. 8 Average number of crimes (per ID) per crime category, before and after recruitment into
mafias
The Criminal Careers of Italian Mafia Members
263
the mafias seems therefore to perform a catalyst function in the criminal career of
the members, expanding offending opportunities both in number and seriousness.
The general belief that sees recruitment into mafias as a starting point in the criminal career of a mafia member, is therefore challenged. In particular, the data present
a new alternative and interesting point of view, which finds recruitment into mafias
as a secure settlement point.
Discussion and Conclusions
The results of the analysis at Micro level shed light on the entire study helping to
discuss its contribution to the knowledge of the criminal trajectories of Italian
Mafiosi.
The first point to be discussed is how this study in general combines with the
theoretical framework designed by Blumstein and colleagues (Blumstein et al.
1988; Piquero et al. 2003). Having chosen the same parameters identified by
Blumstein, the question could be not relevant. On the contrary, considering that five
of the six parameters have been operationalized ex post, the question becomes relevant because the data collected and used for the operationalization process have
influenced the development of the study. The high level of missing information in
the PMM dataset for socio-demographic variables should be considered as a general
limitation to the interpretation of its results (Table 1).
Having considered this limitation and taken into account those parts of the study
that rely on robust data, the answer to the first point is positive. This means that the
results of this study are consistent with the general framework on criminal careers
and with other studies related to the criminal careers of organized crime members
(Kleemans and van Koppen 2014; Van Koppen et al. 2010; Francis et al. 2013;
Fuller et al. 2019). What results is that Italian “Mafiosi” are not different in their
criminal trajectories from other serious criminals as pointed out in section “The
Criminal Trajectories of mafiosi”. Results presented in the other sections, exclude
that Italian mafia members who have been arrested, present relevant differences
with other serious criminals in the five parameters considered, confirming the validity of the conceptual framework. Considering that this study is the first to analyse
the criminal trajectories of mafia members this conclusion is relevant. Same homogeneity is found when in the meso analysis (section “Similarities and Differences of
Italian mafiosi Across Their Criminal Organizations”) convicted criminals are analyzed across the four criminal organizations. Marginal differences are observed in
the distribution of the five parameters allowing to conclude that the seriousness of
the criminal behavior of mafia members is prevalent on the existing differences
among criminal organizations. It should be considered here that even if the variable
“mafia Association” was present in the database with relevant missing data, this
study has overcome this obstacle by creating a new variable (mafia association
aggregated) following the procedure explained in footnote n. 6.
The second point is the relation of the results of this study with the main project
on the recruitment of members from criminal organizations this study is part of.
264
E. U. Savona et al.
Results from the micro-analysis (section “When, Why and Where Do mafiosi Enter
in Their Criminal Organization?”) help to draw the picture in relation to the Italian
criminal organizations. The analysis shows that early recruited members tend to
have less education compared to offenders who joined the mafia at an “average”
age; conversely, late recruits are on average more educated. Moving from the age of
recruitment to the criminal records of offenders, that are the most robust data of the
database, it emerges that early recruited offenders have committed a variety of common crimes, whereas late recruited offenders have committed more drug-related
crimes and white collar crimes. Filtering these results with the impact of the five
parameters, it appears that late recruiters with a better education are more specialized in mafia crimes than younger recruiters. Late recruitment, better education and
crime specialization are the three components that drive the different recruitment
steps in organized crime. There is a necessary caveat: smart offenders with a better
education and being more aware of the risks related to mafia crimes could have
avoided the conviction and be not present in the database considered.
These results have relevant policy implications for project PROTON because
they can help in driving policies for curbing recruitment processes from criminal
organizations. If early recruited are young, less educated, committing a variety of
crimes and late recruited are more educated and more specialized in crimes committed, policies for preventing these two targets need to be different. It could be assumed
that prevention policies of primary (family level) and secondary (school level)
socialization could work effectively in driving young people to legitimate activities
making the illegitimate ones less attractive. On the contrary, criminal policies with
severe sanctions and sophisticated investigations could be more effective in deterring the recruitment of older and more educated offenders that are specialized in
mafia crimes.
Targets and policies are consistent with the recent changes of Italian organized
crime: declining in participation, as the results of this study show, but becoming
more sophisticated in its infiltration in the legitimate businesses. The 2018
Parliamentary Antimafia Commission writes in its report that there is a common
trend in all the territories and organizations consisting in the progressive reduction
of violence in favor of exchange relationships in the illegal and legal markets (CPA
2018, p. 13). These are the relationships that request more sophisticated and well-­
educated personnel. This evolution that could be generalized for all the Italian criminal organizations is anticipated by recent investigations of mafia prosecutors. In the
ad-hoc meeting on Proton project held in Milan on September 15, 2018, the general
prosecutor of Naples declared that from recent investigations it becomes clear that
the recent heads of Camorra organizations are legitimate entrepreneurs.
Entrepreneurs have replaced old “traditional” bosses possibly because they are better able to manage criminal organization in a new environment where the exchange
between the illegal and legal markets are particularly intense.
This study has analyzed the criminal trajectories of Italian “Mafiosi” providing
relevant data for discussing the characteristics of those entering in the Italian criminal organizations. The results, despite some relevant missing data, have opened a
window on the understanding of the mechanisms related to the recruitment processes, introducing policy scenarios that are the object of other parts of Proton proj-
The Criminal Careers of Italian Mafia Members
265
ect. A more complete view to understand today’s processes could be possible
combining the 30 years transformations of Italian organized crime with the policies
used for combatting it. Data used by this project are a good start but additional data
are needed, especially on those socio-demographic variables that have relevant
missing values in this study. These data combined with criminal trajectories of
Italian Mafiosi here analyzed, could produce more focused lessons for future policies against criminal organizations in Italy and beyond.
As explained in the introduction, this chapter develops a statistical analysis of the
data contained in the dataset, following Blumstein’s framework. Its conclusions are
in the comments to the different analyses conducted. The analysis of these data in
relations to the transformations of Italian mafias is postponed to another publication, part of project PROTON. This analysis will start using the Blumstein patterns
to understand and explain the transformations of mafias in Italy in the last 30 years.
Linking these transformations with past and present antimafia policies could help in
developing instruments and offering suggestions to mitigate and reduce the expansion of mafias, and consequently their attractiveness and potential for recruitment.
References
Albini, J. L. (1971). The American Mafia: Genesis of a legend. New York: Appleton-Century-Crofts.
Antimafia, D. I. (2002). Relazione del Ministro dell’Interno al Parlamento sull’attività svolta e sui
risultati conseguiti dalla Direzione Investigativa Antimafia. 1° Semestre 2002. In Rome.
Berlusconi, G. (2014). Italian Mafia. In G. Bruinsma & D. Weisburd (Eds.), Encyclopedia of criminology and criminal justice. New York: Springer.
Blokland, A. a. J., & Nieuwbeerta, P. (2005). The effects of life circumstances on longitudinal trajectories of offending∗. Criminology, 43(4), 1203–1240. https://doi.
org/10.1111/j.1745-9125.2005.00037.x.
Blumstein, A., Cohen, J., Roth, J. A., & Visher, C. A. (1986). Criminal careers and ‘career criminals’ (National Research Council (U S. ) panel on research on criminal careers). Washington,
DC: National Academy Press.
Blumstein, A., Cohen, J., & Farrington, D. P. (1988). Criminal career research: Its value for criminology. Criminology, 26(1), 1–35. https://doi.org/10.1111/j.1745-9125.1988.tb00829.x.
Carvalho, L. S., & Soares, R. R. (2016). Living on the edge: Youth entry, career and exit in
drug-selling gangs. Journal of Economic Behavior & Organization, 121, 77–98. https://doi.
org/10.1016/j.jebo.2015.10.018.
Ciconte, E. (1992). ‘Ndrangheta dall’unità a oggi. Bari: Editori Laterza.
Ciconte, E. (2014). Origins and development of the ‘Ndrangheta. In N. Serenata (Ed.), The
‘Ndrangheta and Sacra Corona Unita (Vol. 12, pp. 33–50). Cham: Springer International
Publishing. https://doi.org/10.1007/978-3-319-04930-4_3.
Commissione Parlamentare Antimafia. (2012). Relazione sulla prima fase dei lavori della
Commissione, con particolare riguardo al condizionamento delle mafie sull’economia, sulla
societa` e sulle istituzioni del Mezzogiorno. Commissione Parlamentare d’Inchiesta sul
Fenomeno della Mafia e sulle altre Associazioni Criminali, anche Straniere, Doc. XXIII, n. 9,
XVI legislatura. Rome.
Commissione Parlamentare Antimafia. (2018). Relazione conclusiva. Rome: Commissione parlamentare di inchiesta sul fenomenodella mafia e sulle altre associazioni criminali, anche straniere. Doc. XXIII, n. 38, Rome.
266
E. U. Savona et al.
Europol. (2013). Threat assessment: Italian organized crime. In June.
Farrington, D. P. (1992). Criminal career research in the United Kingdom. The British Journal of
Criminology, 32(4), 521–536.
Farrington, D. P., MacLeod, J. F., & Piquero, A. R. (2016). Mathematical models of criminal careers. Journal of Research in Crime and Delinquency, 53(3), 336–355. https://doi.
org/10.1177/0022427815620237.
Francis, B., Humphreys, L., Kirby, S., & Soothill, K. (2013). Understanding criminal careers
in organised crime (Report). Home Office. http://eprints.lancs.ac.uk/67009/. Accessed 19 Oct
2017.
Fuller, G., Morgan, A., & Brown, R. (2019). Criminal histories of Australian organised crime
offenders (no. 567). Canberra: Australian Institute of Criminology.
Glueck, S., & Glueck, E. (1968). Delinquents and nondelinquents in perspective. Cambridge:
Harvard Univ Press. Accessed 20 Jan 2018.
Hess, H. (1993). Mafia: Le origini e la struttura. Roma-Bari: Editori Laterza.
Jones, B. L., & Nagin, D. S. (2013). A note on a Stata plugin for estimating group-based
trajectory models. Sociological Methods & Research, 42(4), 608–613. https://doi.
org/10.1177/0049124113503141.
Kleemans, E. R., & de Poot, C. J. (2008). Criminal careers in organized crime and social
opportunity structure. European Journal of Criminology, 5(1), 69–98. https://doi.
org/10.1177/1477370807084225.
Kleemans, E. R., & van Koppen, M. V. (2014). Careers in organized crime. In D. Weisburd &
G. Bruinsma (Eds.), Encyclopedia of criminology and criminal justice. New York: Springer.
Kyvsgaard, B. (2002). The criminal career: The Danish longitudinal study. Cambridge: Cambridge
University Press.
Laub, J. H., Nagin, D. S., & Sampson, R. J. (1998). Trajectories of change in criminal offending:
Good marriages and the desistance process. American Sociological Review, 63(2), 225–238.
https://doi.org/10.2307/2657324.
Lussier, P., Tzoumakis, S., Cale, J., & Amirault, J. (2010). Criminal trajectories of adult sex offenders and the age effect: Examining the dynamic aspect of offending in adulthood. International
Criminal Justice Review, 20(2), 147–168. https://doi.org/10.1177/1057567710368360.
Massari, M. (2014). The Sacra Corona Unita: Origins, characteristics, and strategies. In
The ‘Ndrangheta and Sacra Corona Unita (pp. 101–116). Cham: Springer. https://doi.
org/10.1007/978-3-319-04930-4_7.
Nagin, D. S. (2016). Group-based trajectory modeling and criminal career research.
Journal of Research in Crime and Delinquency, 53(3), 356–371. https://doi.
org/10.1177/0022427815611710.
Paoli, L. (2008). The decline of the Italian mafia. In Organized crime: Culture, markets and policies (pp. 15–28). New York: Springer. https://doi.org/10.1007/978-0-387-74733-0_2.
Paoli, L. (2014). The Italian mafia. In L. Paoli (Ed.), The Oxford handbook of organized crime
(pp. 121–141). New York: Oxford University Press.
Piquero, A. R., Farrington, D. P., & Blumstein, A. (2003). The criminal career paradigm. Crime
and Justice, 30, 359–506.
Piquero, A. R., Raymond, P., Paul, M., Robert, B., & Charles W. D. (1999). Onset Age and Offense
Specialization. Journal of Research in Crime and Delinquency, 36(3), 275–299. https://doi.org
/10.1177/0022427899036003002.
Rhodes, W. (1989). The Criminal Career: Estimates of the Duration and Frequency of Crime
Commission. Journal of Quantitative Criminology, 5(1), 3–32. https://doi.org/10.1007/
BF01066259.
Sales, I. (2015). Storia dell’Italia mafiosa: perché le mafie hanno avuto successo. Soveria
Mannelli: Rubbettino.
Savona, E. U., Calderoni, F., Campedelli, G. M., Comunale, T., Ferrarini, M., & Meneghini, C.
(2017a). Recruitment into mafias: criminal careers of mafia members and mafia bosses (report
The Criminal Careers of Italian Mafia Members
267
on factors relating to OC) (pp. 192–312). Milan: UCSC-Transcrime. https://www.projectproton.eu/wp-content/uploads/2018/01/D1.1-Report-on-factors-relating-to-OC.pdf.
Savona, E. U., Calderoni, F., Superchi, E., Comunale, T., Campedelli, G. M., Marchesi, M. E.,
& Kamprad, A. (2017b). Systematic review of the social, psychological and economic factors
relating to criminalisation and recruitment to OC (report on factors relating to OC) (pp. 5–71).
Milan: UCSC-Transcrime. https://www.projectproton.eu/wp-content/uploads/2018/01/D1.1Report-on-factors-relating-to-OC.pdf.
Serenata, N. (2014). Introduction. In N. Serenata (Ed.), The ‘Ndrangheta and Sacra
Corona Unita (Vol. 12, pp. 1–13). Cham: Springer International Publishing. https://doi.
org/10.1007/978-3-319-04930-4_1.
van de Rakt, M., Murray, J., & Nieuwbeerta, P. (2012). The long-term effects of paternal imprisonment on criminal trajectories of children. Journal of Research in Crime and Delinquency,
49(1), 81–108. https://doi.org/10.1177/0022427810393018.
Van Koppen, M. V., de Poot, C. J., Kleemans, E. R., & Nieuwbeerta, P. (2010). Criminal trajectories in organized crime. The British Journal of Criminology, 50(1), 102–123. https://doi.
org/10.1093/bjc/azp067.
van Onna, J. H. R., van der Geest, V. R., Huisman, W., & Denkers, A. J. M. (2014). Criminal
trajectories of white-collar offenders. Journal of Research in Crime and Delinquency, 51(6),
759–784. https://doi.org/10.1177/0022427814531489.
Investigating the Psychological Profile
of Organized Crime Members
Gerardo Salvato, Maria Laura Fiorina, Daniela Ovadia, Gabriele De Maio,
Elisa Francescon, and Gabriella Bottini
Introduction
Criminal behaviour is a growing worldwide public issue. Likely other human
behaviours, it arises from a convergence of different factors. Many studies have
highlighted the importance of the influence of neurobiological, genetics and socio-­
cultural factors in criminal behaviours (Glenn and Raine 2014; Salvato et al. 2014).
Psychology and neuroscience gained much attention in forensic settings, and its
scientific instruments may help in shedding light on the neurobiological features
characterising complex behaviours.
Over the last decades, researchers have tried to explore and understand the possible
link between criminal behaviour and personality traits. Personality is a multifactorial
construct and refers to individual patterns of thinking, feeling and behaving. The
majority of psychological studies on criminal behaviour provide evidence concerning
specific classes of perpetrators or more in general, in non-organized crime (NOC)
offenders. The available literature on the topic reveals that among the classifications
present in the Diagnostic and Statistical Manual of Mental Disorders (DSM)
(American Psychiatric Association 2013), the most prevalent in NOC criminals are
narcissist, paranoid, borderline, and antisocial personality disorders (Hart et al. 1993;
DeRuiter and Greeven 2000; Blackburn et al. 2003; Gunter et al. 2008; Sansone and
Sansone 2009; Falk et al. 2017; Shepherd et al. 2018). Specifically, the antisocial
G. Salvato · G. Bottini (*)
Department of Brain and Behavioral Sciences, University of Pavia, Pavia, Italy
Cognitive Neuropsychology Centre, ASST “Grande Ospedale Metropolitano” Niguarda,
Milan, Italy
NeuroMi, Milan Centre for Neuroscience, Milan, Italy
e-mail: g.bottini@unipv.it
M. L. Fiorina · D. Ovadia · G. De Maio · E. Francescon
Department of Brain and Behavioral Sciences, University of Pavia, Pavia, Italy
© Springer Nature Switzerland AG 2020
D. Weisburd et al. (eds.), Understanding Recruitment to Organized Crime
and Terrorism, https://doi.org/10.1007/978-3-030-36639-1_11
269
270
G. Salvato et al.
personality disorder is a common psychological condition in criminals that correlates
with aggressive behaviour (DeRuiter and Greeven 2000; Blair 2001; Gunter et al.
2008; Falk et al. 2017). According to the DSM-5, it is characterised by inflexible,
maladaptive, and persistent personality traits causing significant functional impairment or subjective distress. Antisocial offenders initiate their criminal activities from
an earlier age than others and are more likely to express violent behaviours.
Interestingly, the analysis of the scientific literature reveals that only a few psychological studies have focused on prisoners involved in OC (Schimmenti et al.
2014; Craparo et al. 2018). One of the reasons could be that several penitentiary
systems foresee particularly restrictive imprisonment conditions for individuals
belonging to OC, which prevents any contacts with third parties (including researchers). Furthermore, these subjects are often very reluctant to any form of cooperation, including the involvement in psychological studies.
There is only one available study specifically assessing personality disorders in
OC prisoners (Craparo et al. 2018). Craparo et al. (2018) have investigated the presence of personality disorders in a sample of 20 members belonging to the Italian
criminal organisations Cosa Nostra (ten subjects) and Camorra (ten subjects). They
have administered prisoners with the Millon Clinical Multiaxial Inventory-III
(MCMI-III; (Millon and Meagher 2004)), and other tests, comparing the results
between the two groups. They have shown that there were no clinically significant
differences between the two groups at the MCMI-III except for the Masochism
personality scores, which were higher in Camorra members.
Although interesting, this study has some limitations specifically concerning: (i)
the very small sample size, and (ii) the absence of a control group of NOC criminals. In this scenario, in the current study, we aimed at investigating personality
disorders in a larger sample of OC offenders compared to a NOC prisoners group,
to reveal distinctive personality traits of OC members. To this aim, we administered
100 prisoners (50 OC and 50 NOC) with a psychological test that identifies the presence of specific personality disorders. Based on previous findings we expect to find
masochistic and/or antisocial personality disorders in OC criminals.
Materials and Methods
Participants
One hundred prisoners were randomly recruited from two Italian Prisons. According
to their legal records, we assessed 50 OC (age: M = 48.7, SD = 10.2; education:
M = 10.7, SD = 3) and 50 NOC (age: M = 46.6, SD = 13.4; education: M = 10.9,
SD = 3.3) male prisoners. Participants were matched in age and years of education.
All participants were native Italian speakers and had normal or corrected-to-normal
vision. They had no history of neurologic or psychiatric disorders. Informed consent
was obtained prior to participation in the study according to the Declaration of
Helsinki. The Italian Department of Prison Administration and Department of Brain
and Behavioural Sciences of the University of Pavia (protocol n°010) approved the
Investigating the Psychological Profile of Organized Crime Members
271
study. All participants read and signed an informed consent form in which the aims
of the study were explained.
Tests
Firstly, participants were administered with two neuropsychological tests assessing
the integrity of the global cognitive functioning and intelligence: the Addenbrooke’s
Cognitive Examination-Revised (ACE-R) (Mioshi et al. 2006; Siciliano et al. 2016),
and the Raven’s Coloured Progressive Matrices (CPM) (Raven 1958).
Following the neuropsychological screening, they completed the Millon Clinical
Multiaxial Inventory - Third Edition (MCMI-III) (Millon and Meagher 2004). The
MCMI-III is a psychological assessment tool intended to provide information on
personality traits and psychopathology, including specific disorders outlined in the
DSM. It consists of 175 true-false items. It distinguishes 11 moderate personality
disorder scales: schizoid, avoidant, depressive, dependent, histrionic, narcissistic,
antisocial-sadistic, compulsive, negativistic, masochistic, and 3 severe personality
pathology scales: schizotypal, borderline, paranoid.
Statistical Analyses
Data were analysed using SPSS 20 (Statistical Package for Social Science, Chicago,
Illinois). As the first step, we evaluated the two screening tests to exclude participants
with neuropsychological deficits that could influence the personality traits assessment.
According to the tests Italian validations (Basso et al. 1987; Siciliano et al. 2016), none
of the participants presented with scores below the cut-offs in the global cognitive
functioning and intelligence tests. Then, we evaluated personality traits and disorders
of each participant using thresholds according to the Italian validation of the MCMIIII. Accordingly, a cut-off score ≥75 for each of the personality disorder scales was
used to be indicative of a probable diagnosis. For each participant, scale scores were
binary classified as 0 disorder absent (score <75) or 1 disorder present (score ≥75).
Then, we used a binary logistic regression to predict prisoners membership (OC, NOC)
from a set of categorical predictor variables resulting from each dimension explored
with the MCMI-III for moderate and severe personality disorder scales.
Results
We found no difference between the OC and NOC prisoners in terms of age
(F(1,99) = 0.8; p = 0.382), and education (F(1,99) = 0.1; p = 0.706). We did not exclude
any participants from subsequent analyses as they showed a normal global cognitive
functioning and intelligence level.
272
G. Salvato et al.
A logistic regression analysis was performed with group (OC, NOC) as the
binary dependent variable and the scales of moderate personality disorders (schizoid, avoidant, depressive, dependent, histrionic, narcissistic, antisocial-sadistic,
compulsive, negativistic, masochistic) as predictors. The years spent in prison were
included in the model as constant. This final model was significant (omnibus test
χ2(2) = 32.6; p < 0.001; Hosmer and Lemeshow χ2(8) = 8.7; p = 0.36)), and it explained
37.2% of Nagelkerke’s pseudo-variance. We found that holding the years of detention as constant, the odds of an OC prisoner being diagnosed with masochistic personality disorder were 0.25 times greater than the odds for a NOC prisoner (Wald
χ2(1) = 3.8; p = 0.049; OR = 0.25; CI = 0.06–0.99); the other scales were removed
from the model (all ps > 0.05). A second logistic regression analysis performed
using the three severe personality disorder scales (schizotypal, borderline, paranoid)
as predictors of membership did not reach the statistical significance.
As Craparo et al. (2018) have shown that masochistic personality traits were
more likely to occur within a small group of Cosa Nostra compared to Camorra
members, we checked for possible influence of the geographical origin region/
OC-type organisations of our OC members showing a masochistic personality disorder. We performed a chi-square non-parametric test on geographical origin region/
OC-type organisations of the OC prisoners and results did not show any statistical
prevalence of a geographical region/OC-type organisations (x2(3) = 1.2; p = 0.753).
Discussion
Understanding the personality profile of OC members is a crucial factor that may
help in identified tailored rehabilitative treatments and policymakers in devising
effective prevention policies. In the current study, we explore the personality traits
specifically distinguishing the OC from NOC prisoners. Results showed that masochistic personality disorder was more likely to occur in OC than NOC prisoners.
Our findings expand and substantiate very recent evidence, in which masochistic
personality traits have been found in a small group (ten participants) of the Cosa
Nostra members (Craparo et al. 2018). In our case, we did not find in the OC group
presenting with a masochistic personality disorder any influence due to the specific
prevalence of Mafia-type organisations or prisoners’ region of origin in our sample.
One might speculate that the partial discrepancy between the current study and the
Craparo and colleagues’ work (2018) may be due to the very small sample of prisoners that they assessed.
From a psychological point of view, masochistic behaviours have multiple determinants. As suggested by Gabbard (2012) one of such determinant may relate to
active mastery over passively experienced trauma. Individuals who have masochistic personality disorder may recreate abusive and humiliating experiences that they
have endured in the past but from the driver’s seat point of view. Throughout this
unconscious reiteration, they avoid being ambushed by it.
Moreover, from their point of view, the relational attachment to an abusive or
sadistic person may be better than having no relationship at all (Gabbard 2012).
Investigating the Psychological Profile of Organized Crime Members
273
As suggested by Schimmenti et al. (2014), OC members have to adhere, be submitted and obedient to the willingness of their boss (Schimmenti et al. 2014). The
finding of masochist personality disorder in OC members appears to be coherent
with the framework of the organization. It is also important to note that we investigated the behavioural profile of OC members pertaining to the low-hierarchy of
the organization so that such results should be considered as selectively concerning these subjects that typically serve the organization as passive executors rather
than strategic operators.
Being obsequious and incline to sacrifice, encouraging others to take advantage
of this, is typical of the masochistic profile (Millon et al. 2009). This psychological
profile shows several ideal features for the OC that imposes hard rules and rigid
behaviours to be applied to its members. The OC members are bound by commandments based on mobster guidelines. These rules include “professional” and “private” aspects. A good example is the 5th commandment saying: “Always being
available for Cosa Nostra is a duty – even if your wife is about to give birth” indicating the imposition of absolute obedience to the organization. This kind of subjection is typical of the masochistic profile. These written guidelines have also been
defined to control and rein the rebel behaviours of the younger Mafiosi. The rite of
Mafia initiation is based on a sort of religious communion defined by obligations
and rules of correctness and solidarity and are sealed by the condition of suffering.
It is also important noticing that some caution should be paid in interpreting
results from the current study. The question arises of whether the association with
an OC group would shape the behaviour, or the individual must have some innate
personal characteristics to be associated with an OC group. Misuse and misunderstanding concerning the role of psychology and neuroscience in criminal evaluation
have been largely discussed (Gazzaniga 2011; Bottini et al. 2015; Morse 2018). A
specific psychological/behavioural characteristic does not justify and explain in an
exhaustive way the criminal behaviour or a predisposition for an individual to
become a criminal. Instead, both innate factors (genetic heritability), environment,
and the interplay between the two would contribute to the development of individual behavioural characteristics, also involving mental health and cognition (Plomin
and Asbury 2005), so that genetics and specific environmental triggers are required
for a mental disorder to develop.
To conclude, OC members may present with some specific personality traits,
which presumably arise from the interaction between innate factors and the environment. Further studies are needed to explore the neuropsychological/cognitive p­ rofile
of OC members that together with the psychological structure may contribute to
delineate an increasingly detailed cognitive-behavioural picture of OC criminals.
References
American Psychiatric Association. (2013). Diagnostic and statistical manual of mental disorders
(5th ed.). Arlington: American Psychiatric Association.
Basso, A., Capitani, E., & Laiacona, M. (1987). Raven’s coloured progressive matrices: Normative
values on 305 adult normal controls. Functional Neurology, 2, 189–194.
274
G. Salvato et al.
Blackburn, R., Logan, C., Donnelly, J., & Renwick, S. (2003). Personality disorders, psychopathy
and other mental disorders: Co-morbidity among patients at English and Scottish high-security
hospitals. The Journal of Forensic Psychiatry & Psychology, 14, 111–137. https://doi.org/10.1
080/1478994031000077925.
Blair, R. J. R. (2001). Neurocognitive models of aggression, the antisocial personality disorders,
and psychopathy. Journal of Neurology, Neurosurgery, and Psychiatry, 71, 727–731. https://
doi.org/10.1136/jnnp.71.6.727.
Bottini, G., Sedda, A., & Ovadia, D. (2015). Past present and future of neuroscience and law.
Italian Journal of Criminology, 7, 17–22.
Craparo, G., David, V., Costanzo, G., & Gori, A. (2018). Cosa Nostra and the Camorra: Assessment
of personality, alexithymic traits, and attachment styles. International Journal of Law and
Psychiatry, 58, 17–26. https://doi.org/10.1016/j.ijlp.2018.02.010.
DeRuiter, C., & Greeven, P. G. J. (2000). Personality disorders in a dutch forensic psychiatric
sample: Convergence of interview and self-report measures. Journal of Personality Disorders,
14, 162–170. https://doi.org/10.1521/pedi.2000.14.2.162.
Falk, Ö., Sfendla, A., Brändström, S., et al. (2017). Personality and trait aggression profiles of
male and female prison inmates. Psychiatry Research, 250, 302–309. https://doi.org/10.1016/j.
psychres.2016.12.018.
Gabbard, G. O. (2012). Masochism as a multiply-determined phenomenon. In D. Holtzman &
N. Kulish (Eds.), The clinical problem of masochism (pp. 103–112). Plymouth: Jason Aronson.
Gazzaniga, M. S. (2011). Neuroscience in the courtroom. Scientific American, 304, 54–59. https://
doi.org/10.1038/scientificamerican0411-54.
Glenn, A. L., & Raine, A. (2014). Neurocriminology: Implications for the punishment, prediction
and prevention of criminal behaviour. Nature Reviews. Neuroscience, 15, 54–63. https://doi.
org/10.1038/nrn3640.
Gunter, T. D., Arndt, S., Wenman, G., et al. (2008). Frequency of mental and addictive disorders
among 320 men and women entering the Iowa prison system: use of the MINI-plus. Journal of
the American Academy of Psychiatry and the Law, 36, 27–34. doi: 36/1/27 [pii].
Hart, S. D., Dutton, D. G., & Newlove, T. (1993). The prevalence of personality disorder among
wife assaulters. Journal of Personality Disorders, 7, 329–341. https://doi.org/10.1521/
pedi.1993.7.4.329.
Millon, T., & Meagher, S. E. (2004). The Millon Clinical Multiaxial Inventory-III (MCMI-III).
In Comprehensive handbook of psychological assessment (Personality assessment) (Vol. 2,
pp. 109–121). Hoboken: Wiley.
Millon, T., Millon, C., Davis, R., & Grossman, S. (2009). MCMI-III Manual (4th ed.). Minneapolis,
MN: Pearson Education, Inc.
Mioshi, E., Dawson, K., Mitchell, J., et al. (2006). The Addenbrooke’s Cognitive Examination
revised (ACE-R): A brief cognitive test battery for dementia screening. International Journal
of Geriatric Psychiatry, 21, 1078–1085. https://doi.org/10.1002/gps.1610.
Morse S. J. (2018). Neuroscience in Forensic Contexts: Ethical Concerns. In E. Ezra & H. Griffith
(Eds.), Ethics Challenges in Forensic Psychiatry and Psychology Practice (pp. 132–158). U of
Penn Law School, Public Law Research Paper No. 17-8. Available at SSRN: https://ssrn.com/
abstract=2923354
Plomin, R., & Asbury, K. (2005). Nature and nurture: Genetic and environmental influences on
behavior. The Annals of the American Academy of Political and Social Science, 600, 86–98.
https://doi.org/10.1177/0002716205277184.
Raven, J. C. (1958). Guide to using the Coloured Progressive Matrices. H. K. Lewis & Co. https://
psycnet.apa.org/record/1960-00085-000.
Salvato, G., Dings, R., & Reuter, L. (2014). Culture, neuroscience and law. Frontiers in Psychology,
5. https://doi.org/10.3389/fpsyg.2014.01196.
Sansone, R. A., & Sansone, L. A. (2009). Borderline personality and criminality. Psychiatry
(Edgmont), 6(10), 16.
Investigating the Psychological Profile of Organized Crime Members
275
Schimmenti, A., Caprì, C., La Barbera, D., & Caretti, V. (2014). Mafia and psychopathy. Criminal
Behaviour and Mental Health, 24, 321–331. https://doi.org/10.1002/cbm.1902.
Shepherd, S. M., Campbell, R. E., & Ogloff, J. R. P. (2018). Psychopathy, antisocial personality
disorder, and reconviction in an Australian sample of forensic patients. International Journal
of Offender Therapy and Comparative Criminology, 62, 609–628. https://doi.org/10.1177/03
06624X16653193.
Siciliano, M., Raimo, S., Tufano, D., et al. (2016). The Addenbrooke’s Cognitive Examination
Revised (ACE-R) and its sub-scores: Normative values in an Italian population sample.
Neurological Sciences, 37, 385–392. https://doi.org/10.1007/s10072-015-2410-z.
Traffickers in Transit: Analysing
the Logistics and Involvement Mechanisms
of Organised Crime at Logistical Nodes
in the Netherlands: Empirical Results
of the Dutch Organised Crime Monitor
Renushka Madarie and Edwin W. Kruisbergen
Introduction
As demonstrated by the analysis of mobile bandits in the eighteenth century (Blok
2001) or Italian mafia families that evolved in the nineteenth century (if not earlier;
Paoli 2004), organised crime is not a new phenomenon. Nevertheless, only in the
past decades the topic of organised crime has been researched more systematically.
This research led to new insights into involvement mechanisms and criminal trajectories in organised crime. For example, Van Koppen, De Poot, Kleemans, and
Nieuwbeerta (2010) demonstrated that, unlike high volume crime offenders, organised crime offenders are generally older and have a later onset of offending (see also
Van Onna, Van der Geest, Huisman and Denkers (2014)). Researchers have also
shed light on factors that stimulate people to engage in organised crime, like deviant
group morals and financial setbacks (e.g., Kleemans and De Poot 2008; Kruisbergen
et al. 2012; Van Koppen 2013). Moreover, while positive life events, like having a
job and being married, are often considered to have a desisting effect on engagement in high volume crime, Kleemans and De Poot (2008) noted that positive life
events not always lead to desistance from engagement in organised crime. On the
contrary, family ties and jobs could in fact promote involvement in organised crime.
Jobs and family provide the social structures allowing criminals to find potential
co-offenders. Jobs could also facilitate organised crime activities if the jobs encompass a relatively high level of autonomy, mobility, or status (Kleemans and Van de
Bunt 2008).
R. Madarie
The Netherlands Institute for the Study of Crime and Law Enforcement (NSCR),
Amsterdam, The Netherlands
E. W. Kruisbergen (*)
Research and Documentation Centre (WODC), Ministry of Justice and Security,
The Hague, The Netherlands
e-mail: e.w.kruisbergen@minvenj.nl
© Springer Nature Switzerland AG 2020
D. Weisburd et al. (eds.), Understanding Recruitment to Organized Crime
and Terrorism, https://doi.org/10.1007/978-3-030-36639-1_12
277
278
R. Madarie and E. W. Kruisbergen
Research regarding involvement mechanisms and criminal careers in organised
crime has thus demonstrated that factors related to engagement in crime differently
affect organised crime offenders as compared to high volume crime offenders. Even
though a clearer picture of involvement mechanisms and criminal trajectories in
organised crime is now emerging, Von Lampe (2012) notes several aspects of organised crime research that deserve more scrutiny. First, Von Lampe states that most
research on transnational organised crime focuses on destination countries, whereas
the nature of criminal groups and activities in source and transit countries has been
less studied. Second, Von Lampe elaborates that in-depth analyses of the modus
operandi of criminals and the logistics of transnational organised crime activities
are the exception rather than the rule. Finally, Von Lampe explains that if coherent
theoretical frameworks are to be developed, researchers have to compare different
aspects of organised crime across different contexts (e.g., contexts defined by type
of crime). In order to do so, however, researchers have to examine clearly demarcated contexts rather than general categories that encompass a diffuse range of different types of crime.
The present study addresses each of these points by studying transnational organised crime in the Netherlands. The analyses specifically focus on one type of organised crime, namely drug trafficking, and highlight the context of one important
logistical node, namely airports. Airports are pivotal in the free flow of goods and
citizens across the world, but they are also a crucial facility for transnational organised crime. The Netherlands functions in this context as an important transit country
(Kleemans 2007). Transit crime can best be described as international illegal trade.
Although knowledge on organised crime offenders engaging in transit crime has
accumulated recently, systematic analyses of offenders operating on logistical nodes
are still rare. This chapter offers such analyses. The empirical data consists of 16
cases of the Dutch Organised Crime Monitor. Although the main analyses focus on
organised crime at airports (11 cases), organised crime at seaports (5 cases) is analysed as well in order to compare the logistics and involvement mechanisms at the
airport with the seaport.
This chapter is structured as follows: First, a brief overview of the current state
of the literature on involvement mechanisms in organised crime is presented and the
main logistical nodes in the Netherlands are described (section “Becoming Involved
in Transit Crime”). Then, the data and methods used for the analyses are outlined
(section “Data and Methods”). In the results section that follows (section “Empirical
Results”), the results of the analysis of smuggling methods employed by organised
crime offenders and the logistics of their activities are first presented. Subsequently,
the results are presented of the analysis of involvement mechanisms and the social
and occupational embeddedness of the criminal careers of the same offenders. The
chapter concludes by highlighting the main findings and discussing several dilemmas air- and seaports face in the prevention of organised crime (section “Conclusion
and Discussion”).
Traffickers in Transit: Analysing the Logistics and Involvement Mechanisms…
279
Becoming Involved in Transit Crime
In this section, involvement mechanisms in organised crime are first discussed. Five
general types of involvement mechanisms are explained and exemplified. Specific
job characteristics that increase the likelihood of becoming involved in organised
crime are discussed as well. The second part of this section elaborates upon the
nature of organised crime in the Netherlands as well as two settings that are highly
relevant to organised transit crime, namely the main airport in Amsterdam and the
main seaport in Rotterdam. In the third part of this section the process of international drug trafficking is described using crime script analysis.
Involvement Mechanisms in Organised Crime
The social and occupational embeddedness of organised crime provide important
clues on how people become involved in organised crime. Five established involvement mechanisms are: Social ties, work ties, deliberate recruitment, leisure activities and sidelines, and life events (Kleemans 2012). Social ties are an important
factor for becoming involved in organised crime. In the world of organised crime,
no formal mechanisms such as the law or third-party insurances exist to consolidate
trust if transactions do not work out as planned. Criminal groups operate in a hostile
and uncertain environment and, as often argued in organised crime research, therefore need other mechanisms to consolidate trust (Von Lampe and Johansen 2004).
Kleemans and Van de Bunt (1999) argue that social bonding is a solution to this
problem because of the temporal and network embeddedness. Temporal embeddedness of social ties implies that the likelihood of cheating decreases when offenders
know they will meet each other in the future and have information about each other’s past. Network embeddedness implies that group members have information
about one another and that they have a reputation to uphold in their network.
Temporal and network embeddedness of social ties also apply to work ties at the
work place. Colleagues see each other regularly and have to work together for a
longer period of time. Furthermore, colleagues form a network in which information about one another is easily shared. Colleagues therefore have a reputation to
uphold which facilitates trust in the long run. The same line of reasoning could be
applied to persons who frequently meet because they, for example, practice the
same sports, have the same hobby, or visit the same pub (Van de Bunt and Kleemans
2007). While criminal group members sometimes recruit specific persons due to
their connectedness, another reason to recruit specific persons is that they possess
specific knowledge or skills valuable to the criminal group. Such deliberate recruitment could also be aimed at persons who are in a vulnerable position, for example
due to negative life events such as financial setbacks. Negative life events at a later
age are known to increase the likelihood of people becoming involved in organised
crime (Kleemans 2012). Positive life events could also increase the likelihood of
280
R. Madarie and E. W. Kruisbergen
becoming involved in organised crime by creating more possibilities for involvement. Examples of positive life events increasing the likelihood of involvement are
getting married and becoming employed.
Legitimate jobs of organised crime offenders are often characterised by one or
more of the following factors: autonomy, mobility, and frequent social contact
(Kleemans and Van de Bunt 2008). The more autonomy a person has, the less he or
she is directly supervised, and the easier it is to engage in organised crime activities.
In a similar way, the more mobile an employee is, the harder it is to directly supervise him or her, and thus the easier it is to engage in organised crime activities. A
high level of autonomy and mobility both make it easier to conceal criminal activities by making it appear as if these activities are part of licit duties. Truck drivers
are, for example, very mobile. So when they transport drugs, they do not immediately raise suspicion because drug transports look very similar to licit transports.
Finally, jobs involving frequent social contact increase the likelihood of criminal
group members connecting to potential offenders. This is the case for, for example,
shop owners, doorkeepers, and market traders. Employees who are very mobile or
have a highly social job are also more likely to frequent so-called ‘offender convergence settings’ (Felson 2006). These settings are places where offenders meet
potential offenders and start criminal activities together, such as cafés and casinos
(Le and Gilding 2014). Offender convergence settings demonstrate that the place
where people work also affects the chance of them becoming involved in organised
crime. Because organised crime in the Netherlands often encompasses transit crime,
persons working at logistical nodes in the Netherlands could be of great interest to
organised crime groups. The most important logistical nodes in the Netherlands are
described in the next paragraph.
Transit Crime and Logistical Nodes in the Netherlands
Many types of organised crime in the Netherlands can be described as transit crime.
Transit crime mainly involves international illegal trade and uses the same opportunity structures facilitating legal economic activities (Kleemans 2007). The major
businesses of organised crime groups in the Netherlands boil down to international
smuggling activities. In these activities, the Netherlands could function as a destination country, a transit country or, in the case of cannabis and synthetic drugs, a
source country. In its function as a transit country, the Netherlands is an important
‘hub’ for the distribution of drugs to the rest of Europe. Recent reports of the
European Monitoring Centre for Drugs and Drug Addiction (EMCDDA) demonstrate that cocaine import into Europe mainly takes place through Spain and Portugal
in the south and through the Netherlands and Belgium in the north (EMCDDA
2016). The Netherlands is also an important source country for synthetic drugs such
as MDMA and amphetamines since a lot of know-how on the production is available in this country (EMCDDA 2015). The significance of the Netherlands as a
transit point, or starting point, for drug traffickers relates to its demographical,
Traffickers in Transit: Analysing the Logistics and Involvement Mechanisms…
281
g­ eographical and logistical characteristics (Kleemans 2014). Due to its colonial past
and government policies in the 80s and 90s, the Netherlands has a relatively large
number of inhabitants with roots in countries or regions where drugs such as
cocaine, heroin, and hash are produced on a large scale. Because of their roots, these
inhabitants are often better able to connect to these countries or regions and can
therefore be the key between foreign-based crime groups and crime groups based in
the Netherlands. In other words, their roots enable them to bridge ‘structural holes’,
i.e. to form a connection between (parts of) networks that would otherwise be poorly
connected due to geographical and social barriers (Burt 1992). For example, Turkish
persons are generally better able to connect to Turks in Turkey than Dutch persons
with no foreign roots. If a criminal group residing in the Netherlands wants to
import heroin from Turkey, a person well-connected to both the Netherlands and
Turkey is very valuable to that group. Finally, because of its geographical position,
the Netherlands is sometimes considered the gateway to Europe. Two important
logistical nodes contribute to the gateway-function of the Netherlands, namely the
main airport and seaport. These logistical nodes are discussed next.
Amsterdam Airport Schiphol
Amsterdam Airport Schiphol is the largest airport in the Netherlands and one of the
largest in Europe, with approximately 58 million passengers and 1.6 million tonnes
of airfreight being processed in 2015 (Schiphol 2017). While its enormous processing capacity and its connectedness to other parts of the world make Schiphol crucial
to the Dutch economy, these factors also make exploitation of the airport attractive
to criminal groups. Because such large volumes of persons and goods are processed,
not all passengers and airfreight can be thoroughly checked, thereby facilitating
cross-border drug transports. Several security measures have been put in place,
however, in response to large-scale drug trafficking at Schiphol. For example, in
2001, security checks of personnel working at the airport increased. Before the
implementation of security checks, personnel going from land- to airside and vice
versa could relatively easily smuggle drugs. Due to the implemented security
checks, luggage of personnel had to pass similar security procedures as luggage of
passengers. Another example concerns the so-called ‘100%-checks’ that have been
enacted since 2003 to tackle the increasing flow of drug mules smuggling cocaine
into the Netherlands (Kruisbergen 2005). All passengers and their luggage on flights
from specific countries have to pass extra security checks. Furthermore, international cooperation resulted in security measures overseas, i.e. pre-boarding checks
at Hato International Airport on the island of Curacao (part of the former Netherlands
Antilles) (Kleemans et al. 2010).1
This does not mean that every passenger is subjected to exactly the same type of checks (Van
Haaften 2013, p. 2).
1
282
R. Madarie and E. W. Kruisbergen
Port of Rotterdam
The Port of Rotterdam is one of the largest seaports in Europe. Just like the main
airport of the Netherlands, the Port of Rotterdam is an important hub for organised
crime groups (EMCDDA 2016). Between 2009 and 2012, approximately 40 tonnes
of cocaine entering the Port of Rotterdam were seized (Eventon and Bewley-Taylor
2016). In 2013, the Dutch police estimated that a quarter to half of the cocaine consumed in Europe enters via the Port of Rotterdam (Van der Ploeg 2014). Similar to
the airport, the seaport has several security systems in place aimed at detecting illicit
traffic. For example, sea containers are randomly scanned and shipping-agents have
to show certain documents before they can operate in the port.2
International Drug Trafficking: A Short Crime Script
The accumulation of knowledge on topic of drug trafficking through both scientific
research and federal investigations has made it possible to discern several key procedures in the process of drug trafficking. In so-called crime scripts, these sets of
action are schematically organised in a chronological framework (Cornish 1994). In
other words, crime scripts clarify what occurs before, during, and after a crime is
committed. Such scripts also encompass actors, equipment and locations required
for crime commission. Even though different crime groups could use different
equipment or locations, or change their modus operandi in response to police interventions, the flexibility of crime scripts allows for such improvisations. One of the
benefits of crime scripting is that it makes the different steps in the process of crime
commission easier to examine (Chiu et al. 2011). By doing so, crime scripting aids
situational crime prevention, which focuses on environmental aspects that facilitate
crime rather than on personal characteristics of perpetrators (Clarke 1997). As for
international drug trafficking, a typical crime script classified into four main activities is exemplified in Table 1 (Tompson and Chainey 2011). The content of this
crime script is based on the results of analyses of cases of the Dutch Organised
Crime Monitor (see also section “Data and Methods”).
Drug traffickers using logistical nodes such as an airport or seaport face several
challenges. For example, because of the large volume of passengers and cargo processed criminal groups have to know exactly at what time and place “their” mule,
luggage or container arrives. Furthermore, they have to make sure that their contraband passes security checks safely. To this end, they often need insider’s help.
Criminal groups could corrupt law enforcement personnel in order to evade security
A specific modus operandi employed by organised crime groups is the ‘rip-off’ (Eski and Buijt
2016). Characteristic of a rip-off is that criminal groups transport drugs to other countries by using
sea containers ordered by legitimate companies as their transport vehicle. Sea containers are transported as ordered by the legitimate companies and upon arrival, the criminal group takes out the
drug packages before they or the packages are noticed.
2
Traffickers in Transit: Analysing the Logistics and Involvement Mechanisms…
283
Table 1 International drug trafficking crime script
Main
activity
Preparation
Key procedures
1. Acquiring drugs
Pre-activity
2. Transporting drugs to a logistical node
Activity
3. Getting drugs on board (on the vehicle)
4. Getting drugs off the vehicle
Post-activity 5. Transporting drugs to destination
6. Stashing drugs
7. Selling drugs (sometimes after further
refinement)
8. Handling financial flows
Actors, equipment, and
location
Buying drugs from others
Producing drugs by yourself
Borrowing a car
Using acquaintances to drive
Drug mules
(Air)port employees
Customs officials
Cover materials
Borrowing a car
Using acquaintances to drive
House
Shed
Spending cash
Money laundering
checks or they could corrupt port employees to provide them with information
about the arrival of sea containers with drugs. Organised crime groups are thus
sometimes dependent on involvement of employees working at logistical nodes. But
how do these employees become involved in organised crime? The logistical bottlenecks drug traffickers have to solve (step 3 and 4 in Table 1) as well as the involvement mechanisms explaining the participation in organised crime are further
elaborated in section “Empirical Results”. First, however, the data and methods
used are discussed in section “Data and Methods”.
Data and Methods
For the present study, a selection of cases from the Dutch Organised Crime Monitor
(OCM) is used. The OCM is an ongoing research project since 1998 aimed at gaining insight into organised crime in the Netherlands. The main sources of this
research project are files of closed Dutch police investigations of criminal groups
engaging in a wide variety of criminal activities. All cases in the OCM result from
long-term police investigations, often spanning a period of several years. The police
files constitute a rich source of data and include, amongst others, the results of special investigation techniques (e.g., wiretapping and observation) and transcripts of
suspect interrogations. These files are systematically summarised using an extensive checklist that has expanded throughout the years (Kruisbergen et al. 2012).
From a total of 180 cases in the OCM, a subset of sixteen cases was selected for
the purpose of this study. Because the focus of this study is drug-related organised
crime at major transit points in the Netherlands, all drug cases were initially selected.
284
R. Madarie and E. W. Kruisbergen
Subsequently, cases in which the airport or seaport(s) played no role, or only a
minor role, were filtered out. Other criteria employed to select cases were the richness of information with regard to trafficking operations as well as the recency of
the cases. Eleven cases concern drug trafficking through Amsterdam Airport
Schiphol (passenger as well as cargo air transport), five cases concern drug trafficking through the seaport of Rotterdam and/or other seaports in the Netherlands or
neighbouring countries.
The 16 cases together include 286 offenders. The smallest case includes four
offenders, the largest case includes 49 offenders. Four cases involve less than 10
suspects, seven cases involve 10–20 suspects, and five cases involve more than 20
suspects. The majority of offenders (90%) are male. In only one case, the main suspect was female. The timeframe in which the police investigations started ranges
from 1991 up to 2012.
As for the nature of the criminal activities, in 12 cases cocaine was imported
from South America to the Netherlands. In five cases XTC (‘ecstasy’) was exported
from the Netherlands to other countries, such as England, Australia, and the United
States of America. In two cases other drugs than cocaine and XTC were transported
as well.3
To analyse the logistics of organised crime activities, information regarding the
modus operandi of criminal groups was gathered from the cases. To analyse the
occupational and social embeddedness of organised crime activities, information on
topic of jobs, the legal work place, and social relationships were gathered. All information was subsequently categorised. Examples of categories are the type of airport
personnel involved, the type of smuggling method employed, and the reasons
offenders gave to smuggle drugs. The analyses focused primarily on the airport
cases. The seaport cases were used to enrich the data. Important differences in
results between the airport and seaport are discussed separately.
The remainder of this chapter is structured as follows: First, a brief overview of
the criminal structures is provided. Furthermore, the logistics of criminal activities
are discussed. Subsequently, the occupational and social embeddedness are discussed as well as personal reasons for offenders to become and stay involved in
organised crime. Finally, a list summarising the involvement mechanisms is provided after which the chapter concludes with a general conclusion and discussion.
Please note that these numbers do not add up to 16 because in several cases the suspects transported more than one type of drugs.
3
Traffickers in Transit: Analysing the Logistics and Involvement Mechanisms…
285
Empirical Results
Short Description of Criminal Networks
The criminal structures encountered in the studied cases are best described as criminal networks consisting of smaller criminal groups. Separate groups often had their
own trade, but co-operated with other groups if it helped them in their trade. The
following three cases exemplify differences in network structures.
• Case 1: several groups worked together, sometimes on ad-hoc basis, sometimes
more structurally. Each group had a core with co-offenders surrounding the core
members. Most group members were related through family ties.
• Case 2: two separate groups could be distinguished. Each group had a leader.
Only the leaders and other high ranking members in each group communicated
with each other. The two leaders, a man and a woman, once had a romance. The
romance began after the woman moved in with the man. After she became
involved in his drug trade, she involved her own family members as well, which
is how the second related group came to exist.
• Case 7: two criminal groups were initially one criminal group as nearly all members in the network were employed in the same team of cargo handlers. After a
fight between two important members, these members refused to work together
any longer and split up the network in two distinct groups. A few members of the
groups remained in touch, however, to communicate about criminal activities.
In most cases, members had several different types of tasks. For example, a
member could have executive tasks and coordinating tasks or more managerial
tasks. Most groups also had a leader or multiple leaders. Suspects knew their place
in the group. In groups that were largely based on family ties, the oldest family
member in the group was usually in charge.
Logistical Bottlenecks: Getting the Drugs Through
In this section, the logistics of drug trafficking operations at the airport are described.
Central to this section is the question how drugs can be smuggled across country
borders without the smugglers getting caught through security checks. Three types
of tactics to traffic drugs without getting caught are discerned: (1) defying security
checks, (2) avoiding security checks, and (3) neutralising security checks. When
criminal groups attempt to defy security checks, they do pass security checks but
hope not to get caught by using a method of concealment (swallowing drug capsules, for example). This can be done, in principle, without the help of corrupt airport personnel of private companies or law enforcement officers. When avoiding
security checks, smugglers do not pass security checks at all, but rather circumvent
them. The avoiding tactic is facilitated by airport personnel of private companies,
286
R. Madarie and E. W. Kruisbergen
such as cargo handlers, who abuse their privileges to ensure that a package containing drugs can leave the airport without having to pass normal security procedures.
While avoiding tactics aim at simply circumventing the security checks, neutralising tactics directly target law enforcement officers performing security checks.
Customs or other law enforcement officers are bribed so the package passes the
‘checks’.4 Before these tactics are discussed in more detail, a remark has to be made
with regard to the scope and limitations of our analyses. First, due to the sensitivity
of the topics discussed, examples of smuggling methods will be described with a
limited level of detail. Second, discussion of a specific smuggling method does not
imply that it is (still) an effective smuggling method. Although some offenders are
very innovative in their use of smuggling methods, some methods might be rather
dangerous (i.e., there is a high chance of detection). Furthermore, certain smuggling
methods discussed, either techniques to hide drugs or the abuse of privileges by
airport personnel, might now be rendered less effective because of new or increased
levels of security measures.
Defying Security Checks
The most common method to defy security controls was the use of drug mules.
Drug mules were used in eight cases. In four out of eight cases, drug mules swallowed drug capsules. In each of these four cases, the criminal group tried to smuggle
drugs into the Netherlands. In six out of eight cases, drug mules carried luggage
with drugs into the plane with them. In two cases, the criminal groups deployed
both mules that swallowed drug capsules and mules that carried luggage with drugs.
Sometimes criminal groups simply hoped that their mules would not be checked
and considered a caught mule as a business risk (case 6). Other criminal groups took
precautions to try to prevent the drugs from being noticed on scanner images.
Methods aimed at security scanners were employed to defy security checks in six
cases. For example, in case 10, drug mules swallowed coins in order to try to hide
the drug capsules they swallowed when going through a scanner at the airport. Air
freight in which drugs was hidden was frequently tampered with so as to make the
packages appear normal when passing security scanners. For example, in case 3,
carbon paper was used in boxes filled with drugs intended to make the boxes appear
empty when going through a scanner. To send larger batches of drugs, criminal
groups hid drugs in larger machines. To make transportation of these large machines
appear legitimate, criminal groups registered front companies, so they could send or
receive the products in name of the company.
4
In several cases different tactics are used.
Traffickers in Transit: Analysing the Logistics and Involvement Mechanisms…
287
Case 13: The criminal group transported drugs in large machines such as
woodworking machines. The machines were prepared in Europe and then
flown to South America to be filled with drugs. From there, they were transported back again to Europe either by boat or by plane. To make transportation of the machines appear legitimate, the group registered a front company
on paper specialised in woodworking. Although the machines became useless
after preparing them for drug transports, this loss of value was more than
compensated by the value of drugs transported.
Avoiding Security Checks
Security checks were mostly avoided by people working at the airport, such as cargo
handlers and technicians, who (ab)used their job-related personal credentials and
privileges for drug trafficking. For instance, in four cases, computer systems were
exploited to find flight details and, if a drug mule had been arrested, passenger
details. Flight details were consulted to acquire information about, amongst others,
at which time flights with drugs mules and drug packages would arrive, and in
which container the luggage was placed. Passenger lists were consulted to ensure
that a drug mule had indeed been arrested and had not just run away. When employees did not have access to a computer system, other employees with log-in credentials helped them out.
Also in four cases, the criminal group exploited vehicles of companies operating
at the airport to transport packages and luggage with drugs. With these company
vehicles, they could drive discretely from the airplane or basement to other places at
the airport where they would hand over the package to a co-offender, or even drive
off the airport.
Case 9: Suspect A was employed by company E and could therefore use company E’s vehicles. A drove with these vehicles on both landside and airside.
Suspect B worked at the airport for another company, but was not able to use
their vehicles at the airport. Therefore, B was asked to monitor the airport
area while A left the airport area with drugs hidden in a vehicle from company
E. Once A had left, B left the airport area as well. Together they drove to
another location where they transferred the drug packages from company E’s
vehicle to B’s car.
People working at the airport also abused their security badge for criminal purposes. The abuse of a personal security badge occurred in six cases. A personal
security badge is provided to employees working at the airport so they can move
from one section to another in order to carry out their duties. However, this freedom
288
R. Madarie and E. W. Kruisbergen
of movement also provided employees with many opportunities to engage in criminal activities.
Another recurring method to avoid security checks was the manipulation of luggage labels. In case 9, manipulated labels were sent to exporting countries where the
labels were attached to luggage with drugs. Upon arrival in the Netherlands, cargo
handlers could then easily pick up the luggage.
Most of the studied criminal groups searched within their social network for
persons with job-related privileges at the airport in order to avoid security checks.
However, the criminal group in the following case ensured that her members
acquired job-related privileges by establishing a company of their own at the airport.
Case 11: Cleaning company D was owned and run by suspect G and his son
H. With their company, they acquired the same privileges as other janitors
working at the airport. They abused their access to airplanes and information
systems of the airport. G was also in touch with different criminal groups that
wanted to use (criminal) services offered by G’s company. Furthermore, if
drug packages had to be stored safely at the airport, G sometimes hired other
persons working at the airport for 600 euros.
Next to abusing job-related privileges and credentials, criminal groups also
exploited the (technical) complexity of airplanes to avoid security checks. In two
cases (2, 11), drugs were smuggled across borders by hiding drug packages in the
airplane. The exporting group made sure the drugs were well hidden in the airplane
and sent instructions to the importing group about where to find the drugs. Sometimes
“line testing” was done by hiding a distinct object in the airplane that was to be
found by the importing group. Line testing had two purposes. First, by retrieving the
object, the exporting group knew that the instructions were received and correctly
interpreted by the importing group. Second, the exporting group was ensured that
the importing group could actually get the object out of the airplane without getting
caught. The necessity of line testing and the complexity of airplanes are best illustrated in case 2 where even the police could not find the packages with drugs hidden
by the exporting group:
Case 2: Janitors on Curacao hid drug packages in the airplane. The first time,
however, the importing group could not find the packages because they were
looking in the wrong place, just like the police. Subsequently, the janitors on
Curacao planned to send a teddy bear as a test to see if the importing group
could find the bear.
The criminal group in case 7 hid luggage with drugs in airfreight containers.
Because air freight containers are relatively large and therefore have a lot of storage
Traffickers in Transit: Analysing the Logistics and Involvement Mechanisms…
289
space, the importing group received instructions from the exporting group about
where the luggage with drugs was to be found.
Finally, criminal groups also attempted to transport drugs away from the airport
area at the moments of which they believed activity of security personnel was low.
Case 9: Suspect J told the police during an interrogation that luggage with
drugs was often transferred at specific times, because “you knew when there
were customs officers”. If luggage with drugs would arrive at an inconvenient
moment, then the luggage would be stored for a while. Storing luggage was
avoided at places with a lot of sniffer dogs.
Neutralising Security Checks
Security checks could be neutralised by corrupting customs or other law enforcement officers at Schiphol or at the airport of the source country to let drug mules
pass through security checks. Available information in several cases indicates that
corrupted officers might have been involved.5 For example, in one of the cases an
arrestee testified that customs officers received pictures of the mules beforehand so
the mules would be recognised during security checks. Having contacts within customs, however, does not guarantee a “smooth” operation, as some cases involve
disagreement on the amount of money a corrupted officer should receive.
Differences Between Airport and Seaport
The results regarding the modus operandi of criminal groups discussed so far apply
largely to both the airport and seaport. However, differences were also noted
between countermeasures deployed to defy or avoid security checks at the airport
and countermeasures deployed at the seaport. These differences largely pertain to
the difference in general use of the ports. The main function of the seaport is facilitating the flow of goods and not the flow of persons. Conversely, the airport has to
process an enormous amount of persons next to processing enormous volumes
of goods.
First, drugs were frequently transported by drug mules in airport cases. However,
in seaport cases, investigative units only uncovered drug transports in which drugs
were covered up by deck cargo or hidden in sea containers. In none of the seaport
cases persons were caught carrying drugs with them, even though in at least one
seaport case corrupted personnel sailing across the sea was discovered. Because
there is no (large) intercontinental flow of persons at seaports such as the ones in
Although some cases include information that civil servants, such as customs or police officers,
might be involved, the cases often lack sufficient information to prove such involvement.
5
290
R. Madarie and E. W. Kruisbergen
Rotterdam or Antwerp, criminal groups operating at seaports have to rely more on
the flow of goods. Therefore, secondly, criminal groups using seaports more often
used (front) companies to have a legitimate reason to hire sea containers or to legitimise container transport.
Required Skills and Assets
The results so far demonstrate that criminal groups mostly relied on either drug
mules or on job-related credentials, privileges, and knowledge to defy or avoid
security checks. For example, because airplanes are technically complex, group
members need to be familiar with the construction of airplanes to know where to
hide drug packages. They need to know what places are large enough to store the
packages and are relatively easy to open up without causing noticeable damage. If
criminal groups attempt to traffic drugs in luggage without accompanying passengers, they need members who can get hold of this luggage and transport the luggage
from airside to landside. In this case, the group needs members with privileges
which only people working at the airport have. In brief, most personal assets
required to traffic drugs at the airport are job-related assets of people working at the
airport. The role of these job-related assets, or more generally, the occupational
embeddedness of organised crime activities, is discussed in the following section.
Occupational Embeddedness
How do jobs facilitate organised crime? Kleemans and Van de Bunt (2008) argue
that certain jobs bring persons in a better position to contribute to organised crime
activities. Legitimate jobs of persons engaged in organised crime are often characterised by a relative high level of autonomy and mobility. Jobs with a high level of
autonomy are often found in, amongst others, companies aiming to deliver quick
services. Their workers are provided with a high level of independency and less
supervision, like janitors (at airports) and truck drivers. Truck driving is also a typical example of jobs with high mobility, which makes truck drivers more suitable to
transport illegal goods without raising suspicion. When individuals become involved
in organised crime, it is likely that their criminal activities relate to their legal jobs.
For example, a truck driver transporting legal products can easily (also) transport
illegal products. Besides, the truck driver could use his or her practical knowledge
and contacts from his or her legal activities as well (Van de Bunt and Kleemans
2007; Kleemans and Van de Bunt 2008). Not only do jobs provide the logistics and
social contacts to contribute to organised crime, having the same job also increases
trust amongst co-offenders since they know about each other’s reputation.
Furthermore, they can keep an eye on each other when working together (Kleemans
and Van de Bunt 2008). How job-related factors affect engagement in organised
crime is discussed in this section. The following five factors are elaborated upon: (1)
Traffickers in Transit: Analysing the Logistics and Involvement Mechanisms…
291
the similarity between legitimate job duties and criminal activities, (2) autonomy,
(3) mobility, (4) job-specific knowledge acquired through job-related privileges,
and (5) social capital of employees.
When analysing the jobs of organised crime offenders in the studied cases, a
distinction can be made between civilian personnel and law enforcement personnel.
Examples of civilian personnel encountered in the cases are stewards, janitors, technicians, and personnel engaged in (coordination of) cargo handling. Law enforcement personnel encompass customs and police officers. In the majority of cases,
civilian personnel was found to abuse job-related privileges and knowledge to facilitate drug trafficking. In one case, a member of a criminal group became employed
at the airport, but the group was arrested before he could abuse his position.
One of the job-related factors facilitating engagement in organised crime was the
similarity between licit job duties and criminal activities. Because cargo handlers
frequently have to move luggage from one place to another, moving luggage with
drugs did not raise suspicion. In a similar way, technicians have to inspect airplanes
from the inside. Therefore, moving ceilings, removing screws, and checking the
water tanks when looking for hidden drugs all appeared to be part of regular duties.
In general, it could be stated that employees with mainly executive duties in their
legitimate job also mainly carried out executive tasks in their role of criminal group
member. Employees with legitimate coordinating and supervising duties often had
more diverse types of tasks in the criminal group. For example, the director of a
cleaning company in case 11 supervised criminal group members, but also engaged
in logistic activities. A municipal clerk in case 14 gave the criminal group judicial
advice, which relates to his legitimate job, but also transported drugs a few times.
Finally, the similarity between criminal activities and legitimate job duties also
applied to law enforcement personnel. For example, in case 2, criminal group members said that they had corrupted a customs officer, so he would fake checking the
luggage of a mule.
A relative high level of mobility and autonomy are also advantageous for engagement in organised crime activities. Due to high mobility, stewards had plenty of
opportunities to traffic drugs to and from different countries themselves and they
could explore new routes to expand their drug trade. Because cargo handlers were
very mobile, they had plenty of opportunities to transport luggage with drugs from
one side to the other side of the airport without raising suspicion. A high level of
autonomy allowed janitors and technicians to smuggle drug packages from airplanes, cargo handlers to discretely separate luggage with drugs from licit luggage,
and directors to access computer systems at the airport. A high level of autonomy
also facilitated changes in work schedules advantageous to the criminal group. In
one of the cases, the manager of corrupted employees stated in an interview with the
police that the employees frequently changed their work schedule. Employees were
more or less free to switch schedules with other employees. In the following example, the coordinator of a team of cargo handlers made sure that the right employees
were scheduled to work at the right time so they could easily take out luggage
with drugs.
292
R. Madarie and E. W. Kruisbergen
Case 7: Suspect K was a coordinator at a luggage handling company at the
airport. He was therefore able to create or adjust work schedules so that
cargo handlers involved in drug trafficking would be present at the time luggage with drugs arrived. K, however, was not a high ranking member in the
criminal group. Therefore, K only initially designed the work schedule according to the criminal group’s wishes. Later, group members and cargo handlers
L and M created the work schedule themselves while K only had to turn a
blind eye.
This case also demonstrates how mobility, job-related privileges, and the similarity between job duties and criminal activities facilitate drug trafficking at the airport:
Case 7: Cargo handlers working in the luggage handling basement took luggage with drugs out of the container. One of the cargo handlers then carried
the luggage to landside while pretending it was regular luggage. At a public
road on landside, he handed the luggage over to another member of the criminal group. Because the road was busy, the luggage could discretely be transferred. The other member then drove the luggage out of the airport area.
Another job-related factor facilitating engagement in organised crime is job-­
specific knowledge acquired through job-related privileges. For instance, knowing
at which place and time luggage arrives and where that luggage has to be transported to, is job-specific knowledge. To acquire this information, cargo handlers had
to have access to computer systems in which information about the arrival of airplanes can be retrieved. Examples of other privileges resulting in job-specific
knowledge are using company’s vehicles in order to transport luggage or entering
airplanes in order to clean them on the inside. These privileges, or duties, result in
knowledge such as knowing how to manoeuvre airport vehicles and how airplanes
are (roughly) constructed. It appeared from the studied cases that such knowledge is
very useful to criminal groups attempting to smuggle drugs into airplanes and from
airplanes, with or without luggage.
Finally, social capital of employees working at the airport mainly encompasses
other contacts working at the airport or contacts that used to work at the airport. The
following case demonstrates the usefulness of contacts at the airport:
Case 2: Suspect N was supposed to pick up luggage with drugs at the airport.
This luggage, however, had already been taken away by the police. While N
was looking for the luggage, he ran into one of his contacts working at the
airport. This contact was able to access the computer information systems
and could see that the luggage had been taken away by the police. N informed
a higher ranking member, suspect O, about the police seizure.
Traffickers in Transit: Analysing the Logistics and Involvement Mechanisms…
293
To summarise, the occupational embeddedness of organised crime activities is
manifested through five job-related factors. Autonomy, mobility, and the similarity
between legitimate duties and criminal activities all mainly facilitate discrete
engagement in organised crime activities during work time. Job-specific knowledge
makes a person interesting to organised crime groups because this type of knowledge is rather scarce yet very useful to groups operating at logistical nodes. Similarly,
social capital acquired through work also makes a person interesting to organised
crime groups because people who already work at a logistical node are not always
easy to find. The usefulness of social capital in organised crime is further elaborated
in the next section.
Social Embeddedness
In this section, the relationship between group members and the role of settings in
which these relationships are formed are examined in greater detail. First, the role
of ethnicity and the types of relationships between offenders are discussed.
Subsequently, subcultures and offender convergence settings encountered in the
cases are discussed.
Organised crime groups cannot rely on the law or mediation to prevent (the escalation of) conflicts. Therefore, trust, proximity, and having a shared past and future
are important factors in finding new members (Beckert and Wehinger 2011;
Kleemans and Van De Bunt 1999; Loughran et al. 2013; Von Lampe and Johansen
2004). New offenders are thus often persons with whom group members already
have a social bond. Typically, offenders look for potential co-offenders in their circle of friends, relatives, and acquaintances. This often leads to greater ethnic homogeneity within criminal (sub)groups. However, as Kleemans and Van de Bunt (1999,
p. 25) note: “The basis of criminal associations is not formed by ethnicity, but by the
social relations that exist between various persons. This applies to both immigrant
and native offenders.” Social bonds are indeed an important factor in the search for
co-offenders (Morselli 2003; Beckert and Wehinger 2011).
A type of settings that foster strong social bonds concerns subcultures. Members
of subcultures in which strong cohesion is present also demonstrate high loyalty
towards the group (Kleemans et al. 2002). Certain subcultures increase the likelihood of members to engage in crime, if that subculture endorses deviating norms
that approve of, or even promote, crime (Kruisbergen et al. 2012). With the combination of a high degree of loyalty, strong cohesion, and deviating norms, subcultures
provide a pool of potential co-offenders to criminal groups. Newcomers to subcultures or groups endorsing criminal norms are then socialised into criminal practices
(Anand et al. 2005).
Another type of setting that facilitates the introduction of new members is the
so-called ‘offender converge setting’ (Felson 2006). An offender converge setting is
a place where co-offenders meet with each other or with potential co-offenders to
discuss criminal activities. Examples of such places are market places and cafés, but
294
R. Madarie and E. W. Kruisbergen
the legal workplace could also function as an offender converge setting (Kruisbergen
et al. 2012; Kleemans and Van de Bunt 2008).
In most of the studied cases, the ethnicity of group members varied greatly. In
only two cases, criminal groups were completely ethnically homogeneous. In cases
with mixed ethnicities, ethnicity was more homogeneous within subgroups than
between subgroups. This is exemplified by case 1:
Case 1: Group 1 consisted of two Lebanese men, group 2 and 3 each consisted
of two Surinamese men, and group 4 consisted of two Turkish men. There was
also a Colombian man who received drugs from a Surinamese and another
Colombian man. The drugs were subsequently sold to a Greek, a Moroccan,
an Algerian, and a native Dutch man.
Differences in tasks were also related to differences in geographical origin
between subgroups. In cases 2 and 3, for example, a subgroup originating from
Israel and a subgroup originating from the Netherlands could be discerned. In both
cases, the Israeli subgroup was more engaged in drug trade while the Dutch subgroup was more engaged in manufacturing drugs. In case 11, most members had a
Turkish background, but mainly non-Turkish members served as brokers. Brokers
are persons in a network who connect groups that would otherwise be unrelated
(Burt 1997). Through their ethnic background, non-Turkish members were better
able to connect to criminal groups in countries other than the Netherlands and
Turkey, which in turn expanded the drug trade of the whole criminal network.
One of the reasons ethnic homogeneity was greater within (sub)groups is that
offenders frequently introduced family members as new co-offenders. The two
cases in which the criminal group was completely ethnically homogeneous were
both family organisations, that is, nearly all members were relatives of each other.
As Kleemans and Van de Bunt (1999) noted, social relations are of greater importance than ethnicity in the recruitment process. The importance of social relations
over ethnicity is exemplified in case 8. A difference in ethnic backgrounds was
noted in this case between drug mules and money mules. Money mules were all
considered trustees by the leader of the criminal group. These money mules were
also closely related to his family and they had the same ethnic background as the
leader. The drug mules, on the contrary, were not closely related to the leader and
had all sorts of ethnic backgrounds. The drug mules merely engaged in drug trafficking to earn some extra money.
In most cases, 12 out of 16, family ties existed amongst members. In at least 6 of
the 12 cases, romantic partners or ex-partners co-operated in the criminal group.
Besides family ties, most criminal groups also included friendships. In most cases,
the relationship between recruiters and their friends and acquaintances dated years
back. In a few cases it was noted that proximity was also an important factor. New
group members either lived close to the recruiting group members, or they visited
the same (local) stores or restaurants as the recruiting group members. In case 5, one
Traffickers in Transit: Analysing the Logistics and Involvement Mechanisms…
295
of the suspects slowly got involved after she met one of the members who lived in
an apartment above the restaurant she was working for. In case 13, one of the suspects stated that he met many of the group members years ago in the restaurant he
owned back then. Finally, in case 15, suspect A met suspect B by accident when he
was shopping in suspect B’s food store.
Besides consulting family members or friends, criminal groups also attempted to
recruit persons with certain job-related privileges. In 12 out of 16 cases, group
members consulted either direct colleagues or ex-colleagues to search for new
group members.
Case 11: Suspect D was in charge of a cleaning company at the airport which
he used as a front company to cover his drug trafficking operations. D met one
of his fellow suspects a long time ago when they both owned a bar and did
business together. Later on, when D became a janitor at the airport himself,
he met another four of his fellow suspects. D got his five former colleagues
involved in his drugs operations when starting his cleaning company.
The introduction of new group members could also be facilitated by a permissive
subculture among several members of airport personnel. In one of the cases, a person involved in the criminal investigation noted that theft of travellers’ properties
and drugs trafficking frequently occurred because it was a very lucrative activity,
whereas the chance of getting caught was rather low (see also Schelvis and Lub
2008). Due to the nature of our data (i.e., mainly police files), we could not determine with certainty to what extent a permissive culture was indeed present or how
security measures could have affected the pervasiveness of such a subculture.
Offenders not operating in permissive subcultures sometimes met potential co-­
offenders in offender convergence settings. A typical offender convergence setting
is jail. In three cases, group members established contacts in jail, which they used
later when their criminal group needed new group members. In case 15, the market
place functioned as an offender convergence setting where new contacts were established. The advantage of the market place is that it attracts people who are in the
trade business and thus already possess skills and knowledge desired by criminal groups.
To conclude, persons were most likely to be introduced to criminal groups if they
already had a social bond with group members, whether it was through old friendships, jobs, or proximity. The most common type of social bonds encountered in the
cases concerned family ties and job-related ties.
296
R. Madarie and E. W. Kruisbergen
Becoming and Staying Involved in Organised Drug Trafficking
Occupational and social embeddedness are important factors in understanding the
context in which people become involved in organised crime. However, the fact that
a person is employed as a cargo handler does not automatically imply that this person wants to engage in drug trafficking. Similarly, a person does not join a criminal
group simply because he or she has a criminal niece. Therefore, in this section,
personal circumstances and motivations that cause people to become and stay
involved in organised crime are discussed.
Becoming Involved
From the studied cases, a plethora of personal motivations and circumstances could
be distilled that could lead to engagement in organised crime. The most prominent
personal motivations and circumstances are discussed here. First, in both the occupational and the social setting, criminal groups attempted to recruit new members
that were in a vulnerable position. For example, in case 7, cargo handlers who trafficked drugs looked for potential co-offenders by first getting to know their colleagues better and establishing a friendship with them. Group members then had
conversations with their colleagues about their home situation and tried to find out
how susceptible they were to engagement in organised crime. If they found a weak
spot, that colleague would subsequently be persuaded to join the criminal group.
Financial setbacks are one of the types of negative life events that often emerged
as a motivation to become involved in organised crime. In several cases, suspects
told the police that they had financial issues (in general) or that they had debts due
to a gambling or drugs addiction. Financial issues were one of the weak spots criminal groups tried to find in new members. In case 3, a group member persuaded one
of his family members who was in a bad financial situation to become involved in
organised crime.
Case 3: Suspect P told the police that he was approached by suspect Q to
become involved in drug trafficking. P states: “One night, we were having
dinner with my family and Q’s family. At some point, Q said he wanted to
discuss something with me. After dinner, Q asked me if I wanted to go abroad
to escort drug mules. He asked me how I was doing. I told him that I was in a
bad financial situation and that I agreed to go abroad.” P also stated that “he
felt he had no choice because he thought that the money would clear his debts.
Moreover, his engagement would be limited to escorting drug mules to other
countries.”
Traffickers in Transit: Analysing the Logistics and Involvement Mechanisms…
297
Vulnerability due to a bad financial situation was also prominent in immigrants
who had just arrived in the Netherlands. Living in poverty after migrating to the
Netherlands was recurrently claimed to be a motivation for especially those originating from the Dutch Antilles.
Case 10: Suspect Z migrated to the Netherlands, but did not obtain a steady
job and received no welfare payment. Therefore, he did odd jobs for suspect
A, such as doing the groceries and taking the children to school, but also
criminal activities related to drug trafficking. When he was released from
prison, he found a job. However, after 6 months, he became unemployed
again. Z’s financial situation went from bad to worse and he became involved
in A’s drug trafficking business again.
It was also noted that some suspects received social welfare payment in the
Netherlands while investing their drugs money in houses and expensive cars in the
Dutch Antilles. Indeed, several suspects seemed to become involved simply because
they wanted a more luxurious life.
Case 7: Suspect R told the police about his involvement in drug trafficking:
“They just asked me so that I could do more things with my children… You can
earn 6000 euros and then you start to consider your options seriously.”
Whereas suspect R seemed to suggest that the amount of money makes people
think seriously about involvement, other suspects suggested that they were in fact
blinded by the amount of money. As a suspect in case 6 stated: “I know the kind of
scene I entered and it is about a lot of money, so you know what those people do for
all that money.” Despite the fact that some suspects were actually in a bad financial
situation when they became involved in organised crime, they might have also used
this situation as a neutralisation technique for themselves or as an attempt to reduce
criminal liability when talking to the police.
In a few cases, involvement in organised crime resulted from romance. In the
following examples, a group member started a relationship with someone who was
in a bad financial situation after which the new partner slowly became involved in
the criminal group.
Case 10: As stated by a police officer: suspect X involved her partners in her
organised crime activities. When X and Y became involved in a romantic relationship, he started to work for her by carrying out illicit activities for her
criminal group. However, she did not always pay him because, as she told
him, she already paid his rent and gave him food.
298
R. Madarie and E. W. Kruisbergen
Case 2 demonstrates the social snowball method that often describes the introduction of new group members. The social snowball method is a repeated process
in which group members search for new members in their network and those new
members do the same when they have become involved in the group (Kleemans
2012). Sometimes, the snowball method was deployed to find people with specific
assets the criminal group needed for their illicit activities. Case 2 exemplifies the
snowball effect whereby (ex-)colleagues were used to find potential co-offenders.
Case 2: Suspects H and her brother I approached suspect J because they
heard that he had worked at the airport. J knew people who were still working
there and could smuggle luggage with drugs into the plane. J then connected
H and I to someone he knew who could arrange that those people would
smuggle the drugs into planes.
Finally, several suspects admitted that they initially engaged in drug trafficking
for thrill and excitement. In case 14, one suspect engaged in drug trafficking because
he was attracted to criminal activities and the lucrative business of the group. Other
suspects in this case stated that they liked to be around the highest ranking member.
Being in his presence enhanced their status in their environment. In another case,
case 7, one of the suspects told the police: “I found it very exciting because I knew
it was forbidden. On the other hand, I also knew that I could earn a lot of money
with it.” This suspect also said that he had a debt of several thousands of euros.
Staying Involved
Money and social ties are important factors for becoming involved in organised
crime. These factors are also important, however, in staying involved in organised
crime. In case 2 one of the highest ranking members, suspect B, played ‘divide and
rule’ with his group members. According to his group members, B paid them too
little and used them. Because they were dependent on his money, however, they
remained loyal to the group and to him. Many social ties existed among the members as well, ranging from direct family and family-in-law to friendships. Similarly,
in case 13, one of the suspects stated that he only continued his involvement because
he was not yet paid the full amount of money he had earned for his involvement: “If
I would receive all the money, I would not work with drugs anymore.”
Drug mules living in poverty are not only easy bait for criminal groups, but they
are also easy to keep involved. Drug mules might start smuggling to pay off their
debts or to escape poverty. However, they are also made dependent by initially lending them money which they later have to pay back by smuggling drugs. Another
tactic to ensure the mules do not run away is to wait until they have successfully
smuggled the drugs across borders and then pay them afterwards. Nonetheless,
Traffickers in Transit: Analysing the Logistics and Involvement Mechanisms…
299
criminal groups preferred to involve mules that were already connected to criminal
group members because, as explained before, social ties promote trust in each other.
Next to a need for money, greed was another motivation to stay involved. Case 5
exemplifies the attraction of luxury:
Case 5: The main reason for suspect S to traffic drugs was to sustain his luxurious lifestyle. S liked to be the centre of attention. It was one of his dreams to
become co-owner of a dancing club. S probably paid criminal money to fulfil
this dream as he became co-owner during the police investigation. Suspect T
told the police that S had a Ferrari and a BMW that suspect U took away from
him because S owed U money. U had a very profitable club and was so rich
that he actually did not need to traffic drugs for money.
Threats were another method deployed by criminal groups to force their members to stay involved. In several cases, higher ranking members threatened lower
ranking members, if the latter tried to leave the group or even if they complained.
Case 12: Suspect C tells the police that he had to come to a restaurant because
of rumours about unsatisfied members. In the restaurant, he met three higher
ranking members. According to C, tensions rose during the conversation and
they accused him of complaining. At some point, one of the three higher ranking members grabbed a knife on the table and said: “If something like this
happens again, I will cut your throat.”
Sometimes, threats directed at members who tried to leave the group were more
subtle. A suspect in case 9 said that, after he had made clear he wanted to leave the
group, thieves entered his house and took away many of his belongings. Another
suspect also wanted to leave because his involvement made him too nervous. He
told the police:
Case 9: “Several nights before the first shipment, I was unable to sleep. I
continued, however, because D said “You will continue”. He said that face-­
to-­face. I felt threatened and forced. Eventually, I told D a story, namely that
from February 2008 on, surveillance on the airport would be stricter. That
way I tried to quit. (…) They never threatened me, but I felt threatened because
of the way they acted. For example, I never told them where I lived, yet they
did show up at my house.”
300
R. Madarie and E. W. Kruisbergen
Group members were not only threatened with violence when they tried to leave
the group, but also with notifying the authorities of the illegal activities these group
members had already engaged in.
Case 16: Suspect B was head of a spy shop and approached suspects C and D
to offer them an IT-related job. Because both were interested, B challenged
them to demonstrate their IT-skills. The police presume that suspect B subsequently used either C and D’s demonstration or their financial rewards to
pressure them into developing malware that would be used to neutralise the
port’s digital security systems.
Finally, often a high degree of loyalty and strong cohesion exists between members of (criminal) subcultures (Kleemans et al. 2002), which makes it harder to
leave the criminal group.
In sum, money and social bonds are amongst the most motivating factors fostering involvement in organised crime. Criminal groups often rely on the snowball
method when searching for new members in their social network. Persons who are
in a bad financial situation are relatively easily recruited by criminal groups.
However, a strive for luxury might also be a reason to become involved and stay
involved in organised crime, because large amounts of money can be earned quickly
through criminal activities. Threats of violence, either implicit or explicit, were the
primary method deployed by several criminal groups to keep group members, who
attempted to leave the group, involved. However, sometimes threats were not needed
because group members felt obliged to stay due to being part of a subculture in
which social bonds are strong and group loyalty is high.
Conclusion and Discussion
Empirical Results
Based on in-depth analyses of cases from the Dutch Organised Crime Monitor, this
study explored how drug traffickers operate at important logistical nodes in the
Netherlands. Furthermore, the social and occupational embeddedness of organised
crime activities of these drug traffickers were analysed.
As for logistical operations, three types of tactics to traffic drugs without getting
caught were discerned. First, to defy security checks, criminal groups most often
deployed drug mules or methods that were supposed to avoid unusual shapes (of
drugs) on scanner images. Second, to avoid security checks at all, criminal groups
attempted to recruit persons of private companies with job-related personal credentials or privileges through which drugs could be smuggled without passing security
Traffickers in Transit: Analysing the Logistics and Involvement Mechanisms…
301
checks. Therefore, deliberate recruitment was aimed at persons employed at logistical nodes such as (former) colleagues. Finally, to directly neutralise the security
checks themselves, criminal groups corrupted law enforcement officers, i.e. customs or police officers. In exchange for their help, officers received money and
pictures of drug mules so they would know which persons not to check.
The occupational embeddedness of organised crime activities was manifested
through job-related factors. Autonomy, mobility, and the similarity between legitimate duties and criminal activities facilitated discrete engagement in organised
crime activities during work time. Mobility also facilitated exploration of new trafficking routes. Legitimate duties and criminal activities were more similar in
employees with executive functions than in employees with other types of functions, such as managing or coordinating functions. Social capital and job-specific
knowledge both acquired through work are two other factors that make port employees more interesting to organised crime groups. These types of contacts and knowledge are rather scarce yet very useful to groups operating at logistical nodes.
Persons with whom group members already had a social bond were more likely
to be introduced to the criminal group. The snowball effect came into play here.
Current members searched for potential offenders in their network and once
involved, the new group members did the same. The most common types of social
bonds encountered in the cases were family ties and job-related ties such as ties with
colleagues. Involvement of colleagues was fostered in case a permissive subculture
was present at the workplace which then functioned as an offender convergence
setting.
Finally, personal motivations and circumstances leading to involvement in organised crime were examined. Social bonds and money were both important in becoming involved and staying involved. The importance of social bonds for finding and
involving new group members was exemplified by the snowball effect. Whereas
persons in a bad financial situation were relatively easy to recruit, the promise of
luxury was also hard to resist by those who were not in a bad financial situation.
Greed appeared to be more often a reason to stay involved than a need for money.
Sometimes, however, group members were not immediately given the full amount
of criminal money they had earned so as to make them continue to work for the
group. Threats of violence were also frequently employed to make members who
wanted to leave stay in the group. In some cases, threats were not needed because
group members felt obliged to stay due to being part of a subculture in which social
bonds are strong and loyalty to the group is high.
Insight into Involvement Mechanisms for Organised Crime
Earlier research has demonstrated that factors related to engagement in crime differently affect organised crime offenders as compared to high volume crime offenders.
In general, positive life events such as having a job and being married are considered to have a desisting effect on engagement in crime. However, in the case of
302
R. Madarie and E. W. Kruisbergen
organised crime, having a job, a family, and other relationships could promote
involvement in criminal activities through, for example, providing opportunities to
find capable and trustworthy co-offenders. This chapter validates previous findings
on the job characteristics autonomy, mobility, and frequent social contact facilitating engagement in different types of organised crime (Kleemans and Van de Bunt
2008; Van Koppen 2013; Van Koppen and De Poot 2013). As argued by Von Lampe
(2012), research on organised crime often lacks an analysis of modes operandi of
specific types of organised crime. This chapter provided insight into the modus
operandi and logistics of transnational drug trafficking at logistical nodes.
Furthermore, this chapter analysed involvement mechanisms for this specific type
of organised crime, i.e. drug trafficking, and for people working in this specific
context, i.e. airports and seaports. By analysing results of research on organised
crime in a clearly defined context, this chapter adds in-depth knowledge to existing,
general insights into organised crime.
Enhancing (Air)port Security
This chapter showed how drug traffickers operate when they need to pass an important logistical node in the Netherlands, i.e. Amsterdam Airport Schiphol. Logistical
nodes and companies operating at the nodes are key in the prevention of organised
crime. However, decision makers involved in security issues face several dilemmas.
Three of these dilemmas are outlined here: the tensions between personnel’s autonomy and mobility on the one hand and security on the other, the tension between
swift handling procedures and security, and the corruption dilemma.
Autonomy and mobility is more or less necessary for the flexible fulfilment of
the job duties of several types of airport personnel, such as cargo handlers. However,
autonomy and mobility also create opportunities to engage in criminal activities.
Reducing the autonomy of airport personnel and increasing supervision on their
activities could reduce security risks, but could also lead to less flexible and more
time consuming procedures. This dilemma relates to the following, more general
dilemma between speed of handling procedures and security.
An obvious way to reduce opportunities for drug trafficking is to increase security checks. However, increased security checks often result in less swift handling
procedures for transportation of persons and cargo. Due to the economic importance
of and the competition within the transportation sector, speed of handling procedures is an essential asset for airports.
One possible ingredient of a policy aiming at higher levels of security is to hire
more security personnel. However, security personnel could be corrupted. It is a
security officer’s duty to encounter criminal activities and offenders, but this also
opens up opportunities to become involved in crime (Carter 1990). Furthermore,
criminal groups might put more effort in trying to neutralise (corrupt) security personnel when increased security checks make it more difficult to simply defy or
Traffickers in Transit: Analysing the Logistics and Involvement Mechanisms…
303
avoid those checks (see section “Logistical Bottlenecks: Getting the Drugs
Through”).
It is because of these dilemmas alongside the large demand for and supply of
drugs, the profitability of drug trade as well as the resourcefulness of offenders, that
fighting drug trafficking is a truly ‘wicked problem’ (Rittel and Webber 1973). This
does not imply that we should just take drug trafficking for granted. The dilemmas
involved in security policies, the extent of the drug trafficking problem, as well as
the potential threat that organised crime poses to society in general, require that
governments, law enforcement agencies and private companies are constantly
engaged in finding better solutions. Moreover, the transnational character of drug
trafficking requires equally ‘transnational’ countermeasures. The recent past has
demonstrated that international cooperation can produce effective policy measures,
as was the case with the pre-boarding checks at Hato International Airport on the
island of Curacao (Kleemans et al. 2010). Scientific research can contribute by providing an empirical base for policymakers.
Directions for Future Research
The introduction of highly automated processes has greatly changed the way things
work at the ports in the last decades. However, the effect of automation on the
modus operandi of criminal groups is less obvious from the studied cases. Although
some criminal groups tried to circumvent security systems or used automated processes to their advantage, automation played no significant role in the majority of
cases. The lack of abuse of automated systems in most cases could be due to the
timeframe in which investigation of these cases took place. The earliest investigation dates back to 1991, whereas the latest investigation only started in 2012.
Because some of the studied cases are somewhat dated, it is unsure to what extent
smuggling methods of currently operating criminal groups has changed. However,
the results also demonstrate behaviours that are time-persistent, such as recruitment
of persons in one’s own social network and abuse of job-related privileges and
knowledge. Nonetheless, future research should analyse new smuggling methods
and compare to what extent fundamental changes, if any, have taken place due to the
advancement of automated processes.
Another question raised by the data used concerns the generalizability of the
results. All studied cases revolve around large logistical nodes in the Netherlands or
neighbouring countries. It may well be that the size of a logistical node affects the
types of smuggling methods employed by criminal groups as well as the ease with
which these methods are employed. Alternatively, although the exact execution of
smuggling methods may differ between logistical nodes, the general involvement
mechanisms might not. Future research is therefore urged to compare smuggling
methods and involvement mechanisms between different types of logistical nodes.
Furthermore, future research should aim at expanding insight into involvement
304
R. Madarie and E. W. Kruisbergen
mechanisms by focusing on other types of organised crime and other occupational
contexts.
Finally, the present study is also limited by selection bias. Not all criminal activities reach the attention of law enforcement and not all can be solved. In this study,
only solved cases were examined. Even though the cases analysed do demonstrate
great diversity in modus operandi and the nature of crime groups, future research is
suggested to deploy different methods to research this topic. For example, researchers could interview organised crime offenders themselves. By interviewing offenders, it would be interesting to find out if and how occupational and social
embeddedness of organised crime activities differs between different types of
organised crime.
The Cases
Airport Cases
1. Marijuana, cocaine, and heroin traded by a network consisting of several groups
that used each other’s facilities and traded drugs with each other. Marijuana was
shipped in large amounts, whereas cocaine was transported in smaller amounts
by plane to the Netherlands. A janitor at the airport used his privileges to smuggle drugs from the airport, sometimes using vehicles provided by the cleaning
company. Besides luggage, other smuggling methods were swallowing drug
capsules and, in the case of shipped drugs, hiding drugs in machines.
2. Cocaine imported from South America by two related networks that are connected through their leaders. Cocaine was smuggled into and from planes by
personnel working at the airports. Corrupt customs officials received pictures
of drug mules beforehand, so they would recognise them at the airport.
3. Dutch suspects producing XTC (‘ecstasy’) and Israeli suspects exporting this
XTC. Drugs were hidden in toy boxes that were to be transported by plane.
Some flights were avoided due to the scanners used at some airports.
4. A family organisation importing cocaine from Curacao using drug mules and
air freight. In the latter case, cocaine was added to a soup and sent as a frozen
package.
5. Export of XTC to the United States of America and Canada by stewards who
took the pills with them in their personnel luggage. After surveillance had been
increased at the personnel entrance, the group bought plane tickets to get to
airside with the drugs and then hand over the luggage to the stewards.
6. Cocaine import from Curacao and the Dominican Republic by a network with
many ties to the exporting countries. Drugs were smuggled by mules, customs
officials were corrupted, and several air routes were avoided to evade security
checks.
Traffickers in Transit: Analysing the Logistics and Involvement Mechanisms…
305
7. Cocaine imported from South America by a network of colleagues working in
the (luggage handling) basement of the airport. Most suspects worked in the
same team and paid their coordinator to turn a blind eye on the drug trade.
Drugs were carried off the airport with vehicles available for their regular
duties.
8. Export of XTC to Asia and Oceania and import of cocaine from South America.
Money mules were close to the Israeli core members, whereas drug mules were
less close to the core and differed greatly in ethnicity. While the Israelis in this
network were mainly occupied with trade, the Dutch were mainly occupied
with producing drugs.
9. Cocaine imported by a network of colleagues working in the (luggage handling) basement of the airport. Luggage agents, transfer agents, and coordinators all engaged in the drug trade. Luggage labels were sent back to South
America for re-use and luggage reports were falsified. The group used vehicles
of airlines to transport drugs off the airport.
10. Cocaine imported from South America by a Dominican family organisation
with a single mother being in charge. She bought plane tickets for drug mules.
The drug mules swallowed capsules and coins or carried suitcases with metal to
avoid detection by security scanners.
11. Cocaine imported from Suriname and the Dutch Antilles by a group of colleagues who were employed by a cleaning company established to traffic drugs.
Through their duties, they had the privilege to enter airplanes and search for the
hidden drug packages, and to check computer systems for information about
specific flights. In addition, they sometimes borrowed airport vehicles from
persons employed by airlines.
Seaport Cases
12. Hashish trade by a network consisting of several groups that sometimes worked
together on ad-hoc basis and sometimes more structurally. Ships were bought
by front companies to transport hashish hidden in containers to and from the
Netherlands. Sometimes the hashish was not directly brought into the harbour
by ship, but first unloaded onto a smaller boat and then brought to land. After a
transport had succeeded and the ship was no longer necessary to the group, the
ship was sold again. Persons with jobs and/or skills related to sea transport were
recruited, such as captains and electricians.
13. Cocaine trade by a family organisation. The group bought machines in Israel
and the Netherlands, transported the machines as air freight to South America,
filled them with cocaine, and then transported them back to the Netherlands by
ship. Sometimes the Netherlands served as the destination point and sometimes
as a transit point to further distribute the drugs in Europe.
14. Four interrelated groups that imported cocaine and hashish, and exported synthetic drugs such as XTC. Cocaine and hashish were hidden in containers and
306
R. Madarie and E. W. Kruisbergen
shipped from South America to the Netherlands. XTC was hidden in air freight
to the United States of America. Some suspects had connections with shipping
and transportation companies. One suspect worked in the container business.
15. Cocaine exported from South America to several European ports. Certain ports
were avoided due to the type of security scanners in use there. Cocaine was
hidden inside the pallets and masked by different types of covers, such as
bananas. The main suspect had established useful connections during his time
in jail and through his trading company. Furthermore, XTC was exported to the
United States through air freight.
16. Cocaine imported from South America by a large network that hacked a track
and trace website to follow containers in which drugs were hidden. They also
digitally intercepted pin codes to pick up the containers before the legitimately
appointed truck drivers could do so. After unloading the drugs, they returned
the containers to the legitimate companies that ordered the containers in the
first place.
References
Anand, V., Ashforth, B. E., & Joshi, M. (2005). Business as usual: The acceptance and perpetuation of corruption in organizations. The Academy of Management Executive, 19(4), 9–23.
https://doi.org/10.5465/AME.2004.13837437.
Beckert, J., & Wehinger, F. (2011). In the shadow: Illegal markets and economic sociology. Socio-­
Economic Review, 11(1), 5–30. https://doi.org/10.1093/ser/mws020.
Blok, A. (2001). Honour and violence. Malden: Blackwell Publishers Inc..
Burt, R. S. (1992). Structural holes. Cambridge, MA: Harvard University Press.
Burt, R. S. (1997). The contingent value of social capital. Administrative Science Quarterly, 42(2),
339–365.
Carter, D. L. (1990). Drug-related corruption of police officers: A contemporary typology. Journal
of Criminal Justice, 18(2), 85–98. https://doi.org/10.1016/0047-2352(90)90028-A.
Chiu, Y. N., Leclerc, B., & Townsley, M. (2011). Crime script analysis of drug manufacturing
in clandestine laboratories: Implications for prevention. The British Journal of Criminology,
51(2), 355–374. https://doi.org/10.1093/bjc/azr005.
Clarke, R. V. (1997). Introduction. In R. V. Clarke (Ed.), Situational crime prevention: Successful
case studies (pp. 1–43). Guilderland: Harrow and Heston.
Cornish, D. B. (1994). The procedural analysis of offending and its relevance for situational prevention. Crime Prevention Studies, 3, 151–196.
Eski, Y., & Buijt, R. (2016). Dockers in drugs: Policing the illegal drug trade and port employee
corruption in the port of Rotterdam. Policing, 11, 1–16. https://doi.org/10.1093/police/paw044.
European Monitoring Centre for Drugs and Drug Addiction. (2015). Perspectives on drugs:
Synthetic drug production in Europe. Luxembourg: Publications Office of the European Union.
European Monitoring Centre for Drugs and Drug Addiction. (2016). Perspectives on drugs:
Cocaine trafficking to Europe. Luxembourg: Publications Office of the European Union.
Eventon, R., & Bewley-Taylor, D. (2016). An overview of recent changes in cocaine trafficking
routes into Europe. Luxembourg: Publications Office of the European Union.
Felson, M. (2006). The ecosystem for organized crime. Helsinki: European Institute for Crime
Prevention and Control, affiliated with the United Nations.
Traffickers in Transit: Analysing the Logistics and Involvement Mechanisms…
307
Kleemans, E. R. (2007). Organized crime, transit crime, and racketeering. In M. Tonry &
C. Bijleveld (Eds.), Crime and justice in the Netherlands. Crime and justice. A review of
research (Vol. 35, pp. 163–215). Chicago: The University of Chicago Press.
Kleemans, E. R. (2012). Organized crime and the visible hand: A theoretical critique on the economic analysis of organized crime. Criminology and Criminal Justice, 13(5), 615–629.
Kleemans, E. R. (2014). Theoretical perspectives on organized crime. In L. Paoli (Ed.), Oxford
handbook of organized crime (pp. 32–52). Oxford: Oxford University Press.
Kleemans, E. R., & Van De Bunt, H. G. (1999). The social embeddedness of organized crime.
Transnational Organized Crime, 5(1), 19–36.
Kleemans, E. R., & Van de Bunt, H. G. (2008). Organised crime, occupations and opportunity.
Global Crime, 9(3), 185–197. https://doi.org/10.1080/17440570802254254.
Kleemans, E. R., Brienen, M. E. I., & Van de Bunt, H. G. (2002). Georganiseerde criminaliteit
in Nederland. Tweede rapportage op basis van de WODC-monitor. Meppel: Boom Juridische
uitgevers.
Kleemans, E. R., & De Poot, C. J. (2008). Criminal careers in organized crime and social opportunity structure. European Journal of Criminology, 5(1), 69–98.
Kleemans, E. R., Soudijn, M. R., & Weenink, A. W. (2010). Situational crime prevention and
cross-border crime. In K. Bullock, R. V. Clarke, & N. Tilley (Eds.), Situational prevention of
organised crimes (pp. 17–34). Cullompton: Willan Publishing.
Kruisbergen, E. (2005). Voorlichting: Doen of laten? Theorie van afschrikwekkende voorlichtingscampagnes toegepast op de casus van bolletjesslikkers. Beleidswetenschap, 19(3), 38–51.
Kruisbergen, E. W., Van de Bunt, H. G., & Kleemans, E. R. (2012). Georganiseerde criminaliteit
in Nederland. Vierde rapportage op basis van de Monitor Georganiseerde Criminaliteit. The
Hague: Boom Lemma uitgevers.
Le, R., & Gilding, M. (2014). Gambling and drugs: The role of gambling among Vietnamese
women incarcerated for drug crimes in Australia. Australian and New Zealand Journal of
Criminology, 49, 1–18. https://doi.org/10.1177/0004865814554307.
Loughran, T. A., Nguyen, H., Piquero, A. R., & Fagan, J. (2013). The returns to criminal capital.
American Sociological Review, 78(6), 925–948. https://doi.org/10.1177/0003122413505588.
Morselli, C. (2003). Career opportunities and network-based privileges in the Cosa Nostra. Crime,
Law and Social Change, 39(4), 383–418. https://doi.org/10.1023/A:1024020609694.
Paoli, L. (2004). Italian organised crime: Mafia associations and criminal enterprises. Global
Crime, 6(1), 19–31. https://doi.org/10.1080/1744057042000297954.
Rittel, H. W. J., & Webber, M. M. (1973). Dilemmas in a general theory of planning. Policy
Sciences, 4, 155–169.
Schelvis, M. L. & Lub, A. (2008). De gelegenheid te baat nemen. Een verkennend onderzoek op
vijf Europese luchthavens naar kwetsbaarheden in het luchtvrachtafhandelingsproces die kunnen leiden tot criminaliteit. Schiphol: Expertisecentrum Luchthavens.
Schiphol. (2017). Amsterdam Airport Schiphol airport facts. Retrieved May 1, 2017 from: https://
www.schiphol.nl/nl/route-development/pagina/amsterdam-airport-schiphol-airport-facts
Tompson, L., & Chainey, S. (2011). Profiling illegal waste activity: Using crime scripts as a data
collection and analytical strategy. European Journal on Criminal Policy and Research, 17(3),
179–201. https://doi.org/10.1007/s10610-011-9146-y.
Van de Bunt, H. G., & Kleemans, E. R. (2007). Georganiseerde criminaliteit in Nederland.
Derde rapportage op basis van de Monitor Georganiseerde Criminaliteit. The Hague: Boom
Juridische uitgevers.
Van der Ploeg, J. (2014, April 2). Belangrijke cocaïneroutes verlegd naar haven
Rotterdam. De Volkskrant. Retrieved from: http://www.volkskrant.nl/magazine/
belangrijke-cocaineroutes-verlegd-naar-haven-rotterdam~a3626470/
Van Haaften, M. (2013). Tien jaar 100%-controles op Schiphol. Evaluatie rapport. Haarlem:
Bureau Discriminatiezaken Kennemerland.
308
R. Madarie and E. W. Kruisbergen
Van Koppen, M. V. (2013). Involvement mechanisms for organized crime. Crime, Law and Social
Change, 59(1), 1–20. https://doi.org/10.1007/s10611-012-9396-8.
Van Koppen, M. V., & De Poot, C. J. (2013). The truck driver who bought a café: Offenders on
their involvement mechanisms for organized crime. European Journal of Criminology, 10(1),
74–88. https://doi.org/10.1177/1477370812456346.
Van Koppen, M. V., De Poot, C. J., Kleemans, E. R., & Nieuwbeerta, P. (2010). Criminal trajectories in organized crime. British Journal of Criminology, 50(1), 102–123. https://doi.
org/10.1093/bjc/azp067.
Van Onna, J. H. R., Van Der Geest, V. R., Huisman, W., & Denkers, A. J. M. (2014). Criminal
trajectories in white-collar offenders. Journal of Research in Crime and Delinquency, 51, 759–
784. https://doi.org/10.1177/0022427814531489.
Von Lampe, K. (2012). Transnational organized crime challenges for future research. Crime, Law
and Social Change, 58(2), 179–194. https://doi.org/10.1007/s10611-012-9377-y.
Von Lampe, K., & Johansen, P. O. (2004). Organized crime and trust: On the conceptualization and
empirical relevance of trust in the context of criminal networks. Global Crime, 6(2), 159–184.
https://doi.org/10.1080/17440570500096734.
Delinquent Development, Employment
and Income in a Sample of Dutch
Organized Crime Offenders: Shape,
Content, and Correlates of Delinquent
Trajectories from Age 12 to 65
Victor van der Geest, M. Vere van Koppen, and Edward R. Kleemans
Introduction
This chapter describes the shape and content of criminal careers of a large sample
of Dutch organized crime offenders and relates these criminal careers to social economic factors such as employment and income. Other chapters in this volume provide systematic reviews of the literature regarding criminal careers of specific – largely
understudied – groups, such as criminal careers of organized crime offenders (e.g.
Savona et al. 2020). Reviews of the literature demonstrate that the vast majority of
studies focuses on juveniles, adolescents, and high-volume crime. Therefore, we do
not know whether or not ‘established facts’ about traditional criminal careers (e.g.
Farrington 2003; Blokland and Van der Geest 2017) also hold for criminal careers
in organized crime. Does a long and serious criminal career, for example, require an
early onset of offending, as is the case for traditional forms of crime? And is employment an important preventive factor for involvement in crime, as is demonstrated by
studies on employment and criminal careers (e.g. Van der Geest 2011)? Since organized crime is in many ways different from traditional forms of crime (see below),
it is important to focus more empirical research effort on this specific – seriously
understudied – group of offenders.
This chapter is based on information from five data sweeps of the Dutch
Organized Crime Monitor (OCM) including 1921 offenders, combined with information from the Dutch Offender Index (OBJD) on criminal careers of these offenders and information from Statistics Netherlands (CBS) on education, employment
and income of these offenders. After a brief overview of earlier research findings,
based on the Dutch Organized Crime Monitor, the methods section presents a
description of the data and the analyses (fixed effects and group-based trajectory
V. van der Geest (*) · M. V. van Koppen · E. R. Kleemans
Department of Criminal Law and Criminology, Faculty of Law, Vrije Universiteit
Amsterdam, Amsterdam, The Netherlands
e-mail: v.vander.geest@vu.nl
© The Author(s) 2020
D. Weisburd et al. (eds.), Understanding Recruitment to Organized Crime
and Terrorism, https://doi.org/10.1007/978-3-030-36639-1_13
309
310
V. van der Geest et al.
models). In the results section, we describe the criminal careers and employment of
those involved in organized crime at a particular moment in their lives. First, the
total sample is described in terms of offending, educational background, employment, and legal income. We do not only describe the criminal and employment
pathways, but also examine the effect of employment on crime. Second, we divide
the total sample in three different ways, allowing comparisons between different
subgroups of offenders. The first way is to compare criminal careers and employment for offenders involved in different types of organized crime activities. The
second way relates to offenders fulfilling different roles in a criminal organization,
whereas the third way distinguishes offenders based on their criminal trajectory.
The chapter ends with a conclusion and discussion.
Earlier Findings From the Dutch Organized Crime Monitor
The Dutch Organized Crime Monitor is an ongoing research project, carried out by
the Research and Documentation Centre, VU University Amsterdam, and Erasmus
University Rotterdam, focusing on the nature of organized crime in the Netherlands.
The main sources for the Dutch Organized Crime Monitor are closed police files of
criminal groups, often spanning a period of several years (for more information, see
Kleemans 2014). During the period 1996–2017, five data sweeps were carried out,
resulting in the systematic analysis of large-scale investigations of 180 criminal
groups involved in organized crime. In the Dutch Organized Crime Monitor, organized crime is mainly distinguished from terrorism, corporate crime, group crime,
and other types of crime by specific characteristics of the groups involved. Following
the definition of the Fijnaut Research group (Fijnaut et al. 1998), criminal groups
are considered to be organized crime groups when they are focused primarily on
obtaining illegal profits; systematically commit crimes with serious damage to society, and are reasonably capable of shielding their criminal activities from the authorities. Shielding illegal activities from the authorities is possible through various
strategies, for example: corruption, violence, intimidation, store fronts, coded communication, counter-surveillance, media manipulation, and the use of experts, such
as notaries public, lawyers, and accountants. As police priorities influence to a large
extent which criminal groups are investigated in the first place (and to which extent),
a random sample of organized crime cases is inconceivable. Therefore, the OCM
aims at a wide cross-section of empirical cases, using a strategic selection of cases
from a total population of all closed criminal investigations of national and regional
investigation teams (including the fiscal police). The 180 large-scale investigations
relate to eight different types of organized crime: (1) traditional drugs (cocaine,
heroin, cannabis) (2) synthetic drugs, (3) traditional and synthetic drugs, (4) human
smuggling, (5) human trafficking, (6) fraud and money laundering, (7) cybercrime,
and (8) other types of organized crime activities.
Furthermore, it important to note that many forms of organized crime in the
Netherlands can be characterized as ‘transit crime’ (Kleemans 2007): international
Delinquent Development, Employment and Income in a Sample of Dutch Organized…
311
smuggling activities, such as drug trafficking, smuggling illegal immigrants, human
trafficking for sexual exploitation, money laundering and evasion of taxes (cigarette
smuggling, European Community Fraud, VAT fraud, for example), whereby the
Netherlands can be a production country, transit country, or country of destination.
Such activities pose different requirements for offenders than traditional high-­
volume crime (Kleemans and De Poot 2008). The first distinct feature of these
forms of organized crime is the greater importance of social relations, as international trade requires access to suppliers, clients, co-offenders, and profitable criminal opportunities. An important insight from earlier research on the OCM is that not
every offender has this access and that building up these relationships (including
trust) takes time and energy. The second distinct feature relates to the transnational
character of these activities. Given that most existing social networks are often
socially and geographically clustered, the trust problem in illicit trade (e.g. Reuter
1983) is even more complex and many offenders lack the necessary international
contacts that may connect them to these illegal opportunities. Finally, these activities are also logistically far more complex, e.g. transporting illegal goods over long
distances and crossing many borders without being noticed by the authorities.
Therefore, more co-offenders and specific expertise are often needed, including
contacts with the licit world, e.g. for transport, money transactions, and shielding
activities from the authorities. Many people lack these contacts and expertise, and
some acquire them only later on in life, e.g. though their professional activities and
contacts.
In their analysis of 979 suspects who were involved in 79 different organized
crime cases of the OCM, Kleemans and De Poot (2008) coined the theoretical concept ‘social opportunity structure’ – social ties providing access to profitable criminal opportunities – to explain involvement in organized crime. This concept explains
why some offenders ‘progress’ to certain types of organized crime (whereas others
do not) and why some people become involved in organized crime only later in life.
The study particularly highlighted the significant group of ‘late starters’, people
without any appreciable criminal history, and people in conventional jobs who
switch careers.
Furthermore, they analyzed the careers of 66 (ring)leaders and ‘nodal’ offenders
in more detail to find out how their criminal careers had developed. Some (ring)leaders had a long criminal career that could be characterized in four different ways: (1)
the versatile but regionally constrained ‘local hero’ (versatility as a result of both
opportunities and constraints of the local context); (2) the offenders who progressed
into organized crime through an increase in scale (specialization, particularly in
international drug trafficking); (3) those who progressed into organized crime
through capital accumulation (investing in drug transports (while refraining from
hands-on activities) and becoming a ‘background operator’); and (4) those with specific expertise, contacts, and network formation (people getting a central position in
criminal networks, because many offenders and criminal groups need their contacts
and expertise). Surprisingly, however, a significant share of (ring)leaders could be
typified as ‘late onset’ offenders, who had made a switch from a legal occupational
background to organized crime. Among these 32 offenders, a d­ istinction could be
312
V. van der Geest et al.
made between a group of 19 with a background in legal trade (including import and
export) and a group of 13 with other types of occupation – people from the business
sector, the construction industry, assembly, hotels and catering, financial services or
government. Three different types of ‘late onset’ were described: criminal activities
extending from legal activities (opportunities that arise during day-to-day work, particularly in fraud cases); people who obviously switch careers, from legal to illegal
commodities, motivated by the huge profits that can be obtained through the trade in
prohibited commodities, such as narcotics; and finally, people seizing upon criminal
opportunities only later on in life after specific, significant life events (including
financial setbacks and problematic debt situations).
Finally, they analyzed criminal careers of 92 ‘starters’, suspects who did not have
any other prior judicial contacts and who had not ‘progressed’ from high-volume
crime into organized crime. Five ‘involvement mechanisms’ were described in more
detail: (1) deliberate recruitment by criminal groups, (2) social ties and the social
snowball effect, (3) work ties, (4) leisure activities and sidelines, and (5) life events
(including financial setbacks).
A follow-up study by Van Koppen et al. (2010b), on a larger dataset, investigated
the phenomenon of ‘late starters’ in more detail. They elaborated upon this research
and investigated criminal trajectories of 854 suspects, based upon quantitative and
qualitative data from the Dutch Organized Crime Monitor. A semiparametric group-­
model was used to cluster 854 individuals into groups with similar developmental
trajectories. The most important finding of this study relates to the substantial group
of adult-onset offenders (40%) and a group without any previous criminal records
(19%), next to a group of early starters (11 percent) and a group of persisters (30%).
Up till then, no trajectory study had ever discovered such a vast share of adult-onset
offenders. Furthermore, the findings turn out to be quite robust across different
kinds of criminal activities (drugs, fraud, and other criminal activities) and different
roles in criminal groups (leaders, coordinators, and lower-level suspects). Adult-­
onset offenders emerge in several kinds of criminal activities and in several kinds of
roles in criminal groups.
Differences between the organized crime population and the general offender
population were investigated by Van Koppen et al. (2010a). Following up on the
finding that many organized crime offenders do not have judicial contacts before
adulthood, a surprising result of the comparison was that this also turned out to be
the case for the general offender population. However, organized crime offenders do
more often have previous judicial contacts, and those previous contacts are also far
more serious. Finally, these general findings turn out to be robust, as they also apply
when comparisons are made between subsets of the organized crime offenders and
the general offender population, for respectively drug crimes and fraud cases.
Van Koppen (2013) studied involvement mechanisms for organized crime in
more depth through an analysis of 15 crime groups of the Dutch Organized Crime
Monitor, including over 300 offenders. The study shows that the most common
involvement in organized crime is through family and friends who are already
involved. Almost all offender groups in the analysis contain multiple family ties
between offenders, ensuring a basis of trust. Next to family ties, the analyzed groups
Delinquent Development, Employment and Income in a Sample of Dutch Organized…
313
also include individuals from outside the family who bring additional knowledge
and contacts. Two types of resources are explicitly discussed. On the one hand,
criminally experienced individuals who bring their criminal contacts and are used to
the level of excitement. On the other hand, offenders with conventional experience
who bring knowledge, skills and privileges gained in their occupational life. Finally,
the study highlights involvement related to negative life events: some individuals
get involved in organized crime after a financial setback or a relational crisis.
Although employment and work are often seen as preventive factors for involvement in traditional crime, the possible positive effect of employment and work relationships on involvement in organized crime is explicated in a study by Kleemans
and Van de Bunt (2008). The analysis is based upon data from 120 case studies of
the Dutch Organized Crime Monitor, involving 1623 suspects. The study describes
the different kinds of occupations encountered in cases of organized crime and the
main characteristics of these occupations. The study concludes that occupations,
work relations and work settings may provide the breeding ground for organized
crime activities, particularly transit crime. Three different ways in which occupations may present opportunities for committing organized crime are discussed.
First, through international contacts and travel movements. This could explain the
connection with occupations involving mobility, transport, and logistics: contacts
with other countries and other social groups provide ample opportunity to discover
and act upon certain opportunities of transit crime. Second, the individual freedom
of movement and/or discretion is important. This explains the involvement of directors of (small) businesses, independent professionals and, in some cases, individuals
with relative autonomy in larger organizations, such as companies and banks. More
trust and autonomy also provide more opportunity of abuse. Third, the social nature
of certain occupations is important. Occupations in which people often meet with
different people also present many opportunities to meet potential co-offenders,
buyers, or suppliers. Furthermore, the study describes various cases in more detail,
highlighting the embeddedness of certain organized crime activities in work relations and work settings. A good example is provided by work settings related to
ports, such as airport and harbors, which a very important for the import, transit, and
exports of illicit goods and/or people. In this volume, Madarie and Kruisbergen
provide an in-depth analysis of the importance of such work settings, based on
selected cases of the Dutch Organized Crime Monitor.
Methods
For the purpose of this study, information from the Dutch Organized Crime Monitor
(OCM) is combined with information on criminal careers from the Dutch Offender
Index (OBJD) and information on education, employment and income, property
values and debts from Statistics Netherlands (CBS).
314
V. van der Geest et al.
Data
Organized Crime Monitor
In five sweeps of the OCM, information of a wide cross-section of 180 cases concerning various forms of organized crime was collected. In the studied criminal
groups, 2305 offenders were involved. Police files and extensive case descriptions
allowed for classifying different roles that offenders fulfill and different types of
organized crime activities. For the current study, we distinguished three different
roles: (1) leaders, (2) coordinators, and (3) offenders with different roles.1 Leaders
are those offenders who fulfill an executive function in a criminal group; they give
orders to co-offenders and monitor the whole criminal process. Coordinators plan
and manage concrete criminal activities. For instance, they take care of offenders
performing concrete acts, such as transports of drugs. Other offenders are, for example, deployed in the actual transport of illegal goods or act as a facilitator and are
responsible for particular logistical processes. Furthermore, based on the primary
criterion offence, we distinguished between eight different types of organized
crime: (1) traditional drugs, (2) synthetic drugs, (3) traditional and synthetic drugs,
(4) human smuggling, (5) human trafficking, (6) fraud and money laundering, (7)
cybercrime, and (8) other types of organized crime activities. To make comparisons
less complex, we combined the first three categories into one broader category
(drugs). Also, since only 1% of the sample was involved in cybercrime-activities,
this category was merged with the other-category. In sum, all individuals are classified as having one of three roles and being involved in one of six types of organized
crime activities.
Dutch Offender Index
For information on offending over the life course, we used information (rap sheets)
from the Dutch Offender Index (OBJD). We were able to reconstruct the entire
criminal careers for 1921 individuals (out of 2305). These individuals constitute the
final sample for this study. For each individual in the sample, information on all
judicial contacts registered at the Dutch Public Prosecutor’s Office is available from
age 12 (the minimum age of legal responsibility in the Netherlands) up to 2016 or
death (if this occurred prior to 2016). This not only includes the timing and nature
of offenses, but also details of the individual and how the criminal case was adjudicated. Two measures of seriousness were used in the current study. First, the statutory maximum punishment under Dutch law was used, distinguished in three
different categories: (1) minor; for offences up to 4 years punishment threat, (2)
The role of 64 individuals (3,3% of the final sample) is unknown. These individuals are, therefore,
excluded from the analyses where individuals are distinguished based on their role in a criminal
organization.
1
Delinquent Development, Employment and Income in a Sample of Dutch Organized…
315
moderate; for offences with a 4 to 8 years punishment threat, and (3) serious; for
offences related to more than 8 years punishment. This measure is independent of
the judicial history and circumstances of the suspect, but also does not take into
account the conditions under which the offences took place. Therefore, we used a
second measure of offence seriousness: the judicial settlement of cases. For each
case, it was indicated whether or not an unconditional prison sentence was imposed
and what the duration of this prison sentence was. Although this measure is not a
pure reflection of the seriousness of the offence (individual circumstances and prior
judicial contacts can affect the sentence), it does take into account the conditions
under which the offence took place.
Statistics Netherlands
For all 1921 individuals in the final sample, information on their highest education,
employment, income, property values, and debts was collected from Statistics
Netherlands. For individuals in the sample, their highest level of education attained
was measured in 2015. Unfortunately, information on education is missing for half
of the sample. Information on employment, income, property values and debts was
available for the entire sample and measured longitudinally from 1999 to 2016,
which means that it covers 18 years of each individual’s life. For privacy reasons,
frequencies lower than ten are not reported.
During the 18-year period, all employment transitions were given (dates of starting a new contract and dates of ending a contract). We used several measures to
summarize employment data. First, the distribution of working careers was given by
indicating the total amount of time someone was employed during the observation
period (never, up to half a year, half a year up to 3 years, 3–7 years, or more than
7 years). Second, λ describes the mean number of employed days in a year during
the observation period. For example, if individual A works fulltime (365 days) for
5 years and then becomes unemployed for 5 years, his λ for this 10-year period will
be 182,5. Third, for each individual, it was determined whether or not he or she was
ever self-employed during the observation period. Fourth, we used a longitudinal
dichotomous variable to indicate whether an individual was employed or unemployed during a year. An individual is considered employed in a particular year if he
or she was employed for at least 182,5 days during that year. This dichotomous
employment variable was used in all analyses examining the effect of employment
on crime.
Similar to employment, information on income is available longitudinally for
year 1999 up to year 2016. Several measures were used to examine legal earnings.
First, for each calendar year, total legal income is given in euros. Second, the income
percentile compared to the total Dutch population is given for each observed year.
Third, the proportion of years with a positive income within the observation period
is measured. Finally, it is indicated for each individual whether he or she ever
received social benefits during the observation period. It is important to note that by
using official register data, the analyses pertain to legal income. Although previous
316
V. van der Geest et al.
studies suggest that undeclared work is often conducted on a self-employed basis, it
is unknown to what extent self-employed activities are evidence for undeclared
income. Therefore, the analyses of (signals of) illegal income is beyond the scope of
the current chapter.
Several measures are used to indicate individuals’ properties and debts. First, it
was known for each year (1999–2016) what the value of the main property was.
Furthermore, the total property value gives the total value of the real estate possessed by an individual. On the other hand, most individuals also have debts. These
debts are broken down into mortgage debt and other debts.
Analyses
Simple comparisons between subgroups of organized crime offenders were carried
out. Within tables, differences between subgroups were analyzed by ANOVA’s (for
continuous variables) or Chi-square tests (for dichotomous variables). In case of a
significant difference between multiple subgroups on a continuous variable,
Bonferroni post hoc tests were conducted to indicate which subgroups differ
significantly.
Fixed Effects Models
To examine the causal effect of employment on crime, a methodological approach
should be used that rules out selection because obtaining a job or becoming unemployed does not occur at random. Employed individuals differ from individuals
without a job. A randomized experiment is the best approach to demonstrate a causal
effect, but is unrealistic in the current study. One of the next-best approaches to
control for a selection bias and demonstrate a causal effect is estimating a fixed
effects panel model. A fixed effect model is able to control for unobserved differences between individuals by only measuring within-individual change over time.
Because fixed effects models control for all time-stable differences, there is no need
to include time-stable control variables. For the total sample as well as for all subgroups based on role, organized crime type and offending pattern, a separate fixed
effect model was estimated, indicating the effect of employment on crime for each
subgroup.
Group-based Trajectory Models
Semi-parametric group-modeling was used to cluster groups of individuals with a
similar offending pattern over age (Nagin 2005; Nagin et al. 1995). Multiple trajectory analyses were carried out and both the Bayesian Information Criterion and
probabilities of group membership were used as a basis for selecting the optimal
Delinquent Development, Employment and Income in a Sample of Dutch Organized…
317
model. Given the chosen model, individuals were assigned to the trajectory where
his or her posterior probability of group membership is highest. The trajectory
group an offender is assigned to, gives an estimation of the offending path he or she
has followed.
Results
Characteristics of the Offender Sample
Most individuals in the sample are male (91%) and a majority was born in the
Netherlands (61%, see Table 1). Five percent died before 2016, which is the end of
the observation period, at a mean age of 58 years.
Offending Over the Life Course
On average, organized crime offenders were 27 years old when their first judicial
contact took place (Table 2). On average they committed a total of 11 crimes during
their life course. For 9% of the offenders, the organized crime case is the only crime
that was registered. About one-third committed two to five crimes, about one quarter committed up to 10 crimes, and about one-third committed more than 10 crimes
during their lives. Most of these crimes are minor,2 and on average organized crime
offenders committed only one serious crime. Three out of four offenders spent some
time in prison during their criminal life-course. On average, they received three
separate prison sentences, and spent 2 years in prison. At the time of their organized
crime case, they were on average 38 years old. More than one-third was imposed a
prison sentence for their organized crime activities, and they spent an average of
10 months in prison. Offending within the sample started rising from age 12 on,
reached its peak at the relatively high age of 30, and slowly declined from that age
on (Fig. 1). Compared to the traditional age-crime curve (Gottfredson and Hirschi
1990), offending stayed relatively high and only started dropping to a lower level
from age 50 onwards.
Life-course Outcomes: Education, Employment and Income
Table 2 shows life-course outcomes for the organized crime offenders. More than
half of the sample with a known educational level, only got elementary or prevocational education. One out of ten received higher education. About a quarter of the
However, organized crime offenders were found to commit less minor and considerately more
serious offences than the general offender population (Van Koppen et al., 2010a).
2
318
V. van der Geest et al.
Table 1 Descriptives of the sample (N = 1921)
Male
Born in The Netherlands
Died before end observation period
Age of death
Country of birth
The Netherlands
Surinam
Turkey
Morocco
Former Netherlands Antilles
Other western countries
Other non-western countries
Unknown
Total criminal career
Age at first crime
Number of crimes
Violence
Property
Drugs
Other
One-shot offender
2–5 crimes
6–10 crimes
>10 crimes
Number of minor crimes (< 4 years punishment threat)
Number of moderate crimes (4–8 years punishment threat)
Number of serious crimes (> = 8 years punishment threat)
At least one prison sentence
Number of prison sentences
Time spent in prison (years)
Criterion case in organized crime
Age
Prison sentence
Length of prison sentence (years)
Role in criminal organization
Leader
Coordinator
Other role
Role unknown
Type of organized crimea
Traditional drugs
Synthetic drugs
Mean (SD) / N (%)
1738 (91%)
1166 (61%)
96 (5%)
58.1 (10.3)
1166 (61%)
149 (8%)
140 (7%)
44 (2%)
39 (2%)
98 (5%)
280 (15%)
5 (0%)
26.7 (10.3)
10.9 (11.3)
1.0 (1.9)
2.2 (4.4)
0.9 (1.3)
6.8 (7.0)
172 (9%)
593 (31%)
456 (24%)
692 (36%)
6.4 (6.7)
3.6 (5.6)
0.9 (1.2)
1430 (74%)
2.6 (3.7)
2.3 (3.7)
38.0 (9.8)
705 (37%)
0.8 (1.8)
217 (11%)
67 (3%)
1573 (82%)
64 (3%)
611 (32%)
156 (8%)
(continued)
Delinquent Development, Employment and Income in a Sample of Dutch Organized…
319
Table 1 (continued)
Mean (SD) / N (%)
386 (20%)
115 (6%)
73 (4%)
389 (20%)
22 (1%)
169 (9%)
Traditional + synthetic drugs
Human smuggling
Human trafficking
Fraud and money laundering
Cybercrime
Other
All individuals are classified as being involved in one type of organized crime based on the primary offence in the criterion case
a
Table 2 Life outcomes
Mean (SD) / N (%)
Highest educational level
Elementary education
Prevocational education
Selective secondary education
Vocational training
Higher education
Unknown
Employed
Never during observation period
0–0.5 year
0.5–3.0 years
3.0–7.0 years
> 7 years
λ (mean number of employed days during the observation
period)
Ever self-employed during observation period
Mean income per observed year (in euros)
Mean income percentile per observed year
Proportion of observed years with positive income
Ever received social benefits during observation period
Main property value
Total property value
Mortgage debt
Debts (other than mortgage)
278 (15%)
205 (11%)
67 (4%)
236 (12%)
91 (5%)
1044 (54%)
467 (24%)
168 (9%)
388 (20%)
382 (20%)
516 (27%)
93.4 (105.5)
536 (28%)
18,447 (22,417)
39.3 (23.7)
0.8 (0.3)
624 (34%)
95,233 (227,938)
224,043 (2,067,946)
199,469 (265,435)
82,951 (1,340,081)
sample was never legally employed during the observation period. Half of the sample was employed up to 7 years (out of 18 years observation) and only one out of
four was employed more than 7 years. During the observation period, organized
crime offenders were employed on average 93 days a year (25% of the year). Given
that employment participation of the Dutch population fluctuated between 63.8 and
66.7% during the same period (1999–2016), employment in the organized crime
320
V. van der Geest et al.
0.5
0.4
0.3
0.2
0.1
0
12 14 16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 58 60 62 64
Fig. 1 Offending over the life course
0.5
0.4
0.3
0.2
0.1
0
16 18 20 22 24 26 28 30 32 34 36 38 40 42 44 46 48 50 52 54 56 58 60 62 64
Fig. 2 Employment over the life course
sample can be considered relatively low (Statistics Netherlands 2018). Employment
participation is highest in early adulthood, but shows a steady decline from that
point on (Fig. 2). Already before the age of retirement, employment dropped to
10%. In the middle of the observation period (2008), employment participation
among 15–20 year-olds was 55%, topped at age 30–35 with 89%, was still 80%
among 50–55 year-olds and decreased to 33% among 60–65 year-olds (Statistics
Netherlands 2018). More than one out of four organized crime offenders were self-­
employed at some time between 1999 and 2016. No effect was found of employment on crime for the total sample (Table 3). The average income in the sample was
18,447 euros, which is at the 39th percentile. One out of three received a social
benefit at some point during the observation period. The main property value is relatively low compared to the total property value and the average mortgage debt.
Delinquent Development, Employment and Income in a Sample of Dutch Organized…
321
Table 3 Effect of employment on crime
Control variables
Age
Age2
Employment
Employed (for at least a half year)
Log likelihood
Model 1
Full sample
B (SD)
Model 2
Full sample
.13∗∗∗ (.00)
−.00∗∗∗ (.00)
.06∗∗∗ (.01)
−.00∗∗∗ (.00)
−40,946.20
.02 (.03)
−16,540.65
†p < 0.10, ∗p < .05, ∗∗p < 0.01,∗∗∗p < .001
ffending and Life Outcomes Distinguished by Role in Criminal
O
Organization
Descriptives of Role in the Criminal Organization
Now that the characteristics, offending careers, and life outcomes of the total sample have been examined, we go into more detail and distinguish between several
subgroups within the sample. Within criminal groups, offenders can fulfill different
roles. One out of 10 offenders acts as a leader of a criminal group, 3% fulfills a
coordinating role, and 82% has another role within the criminal organization
(Table 1). The role of 64 individuals (3% of the sample) is unknown. These individuals are therefore excluded from the analyses where individuals are distinguished
based on their role in a criminal organization.
Link Between Employment and Crime: Leaders and Coordinators
Offenders with a coordinating role differ from leaders and others in most aspects
related to their criminal life course. Compared to leaders and those with another
role, coordinators are older at the time of their first crime, they commit less crimes
(they are more often one-shot offenders and less often chronics [i.e. committing
more than 10 crimes]). They also less often receive a prison sentence and spend less
time in prison (Table 4). In sum, leaders seem to have more severe criminal careers
in terms of frequency and seriousness than coordinators.
In line with these findings on the criminal careers, coordinators have better life
outcomes than leaders on many aspects. Coordinators are more often higher educated than leaders and others (Table 5). Only 4% of the coordinators was never
employed during the observation period, compared to 36% of the leaders and 24%
of the others. Also, 43% of the coordinators worked for 7 years or more, compared
to only 15% of the leaders and 28% of the others. On average, coordinators were
employed 147 days a year, compared to 55 days (leaders) and 97 days (others).
Coordinators also had a higher income and less often received social benefits.
322
V. van der Geest et al.
Table 4 Offending distinguished by role in criminal organization
Age at first crime∗∗∗
Age at criterion case
Total criminal career
One-shot offender∗∗
2–5 crimes∗
6–10 crimes
>10 crimes∗∗∗
Number of crimes∗∗∗
Violence∗
Property†
Drugs∗∗∗
Other∗∗∗
Number of minor crimes (< 4 years punishment
threat)∗∗∗
Number of moderate crimes (4–8 years punishment
threat)∗∗
Number of serious crimes (> = 8 years punishment
threat)∗∗∗
At least one prison sentence∗∗∗
Number of prison sentences∗∗
Time spent in prison (years)∗∗∗
Organized crime case
Prison sentence∗∗∗
Length of prison sentence (years)∗∗∗
Leader
Coordinator Other role
(N = 217) (N = 67)
(N = 1573)
Mean (SD) / N (%)
26.7A (9.2) 31.4B (12.4) 26.3A
(10.3)
38.4 (8.8) 38.4 (9.5)
37.9 (10.0)
9 (4%)
61 (28%)
49 (23%)
96 (45%)
12.0A
(11.5)
1.0AB (1.8)
2.6 (5.6)
1.2A (1.4)
7.2A (6.2)
6.7A (6.0)
12 (18%)
31 (46%)
16 (24%)
8 (12%)
5.6B (5.4)
0.4A (1.0)
1.2 (1.7)
0.5B (0.7)
3.5B (3.8)
3.2B (3.7)
139 (9%)
479 (31%)
378 (24%)
571 (36%)
11.1A
(11.5)
1.0B (2.0)
2.3 (4.3)
0.8C (1.3)
6.9A (7.1)
6.5A (6.8)
4.0A (6.6)
1.6B (2.4)
3.7A (5.6)
1.3A (1.3)
0.8B (0.8)
0.9B (1.3)
174 (80%)
3.0A (3.7)
4.4A (5.0)
37 (55%)
1.0B (1.5)
1.0B (1.8)
1178 (75%)
2.6A (3.8)
2.1B (3.5)
113 (52%)
2.2A (2.9)
22 (33%)
0.6B (1.4)
570 (36%)
0.7B (1.5)
Significant difference between offenders fulfilling different roles are indicated per variable
(†p < 0.10, ∗p < .05, ∗∗p < 0.01,∗∗∗p < .001). Within each row, different superscripts indicate a
significant difference between offenders with different roles (p < 0.05). For example, A and B differ
significantly; AB differs from neither A nor B
Neither significant differences between the subgroups were found in the number of
offenders that were self-employed, nor were any differences found in property values and debts between leaders, coordinators, and others.
Interestingly, both leaders and coordinators show a different pattern than is standard in the literature on the relationship between employment and crime: both for
leaders and coordinators, a significant positive effect of employment on crime was
found (Table 6, Model 3 and 4). Employment significantly increases offending with
31% for leaders and with 46% for coordinators. The only group that benefits from
employment in the sense that they commit less crimes, are those with other roles;
employment accounts for a crime reduction of 7% for this subgroup (Table 6,
Model 5).
Delinquent Development, Employment and Income in a Sample of Dutch Organized…
323
Table 5 Life outcomes distinguished by role in criminal organizationa
Highest educational level∗∗∗
Elementary education
Prevocational education
Selective secondary education
Vocational training
Higher education
Unknown
Employed∗∗∗
Never during observation period
0–0.5 year
0.5–3.0 years
3.0–7.0 years
> 7 years
λ (mean number of employed days during
the observation period)∗∗∗
Ever self-employed during observation
period
Mean income per observed year (in
euros)∗∗∗
Mean income percentile per observed
year∗∗∗
Proportion of observed years with positive
income∗∗∗
Ever received social benefits during
observation period∗∗
Main property value
Total property value
Mortgage debt
Debts (other than mortgage)
Leader
(N = 217)
Coordinator
Other role
(N = 67)
(N = 1573)
Mean (SD) / N (%)
31 (14%)
16 (7%)
<10
14 (6%)
<10
143 (66%)
<10
<10
<10
13 (19%)
11 (16%)
31 (46%)
232 (15%)
179 (11%)
57 (4%)
200 (13%)
70 (4%)
835 (53%)
78 (36%)
18 (8%)
58 (26%)
30 (14%)
33 (15%)
54.6A (75.7)
3 (4%)
3 (4%
13 (19%)
19 (28%)
29 (43%)
147.2B (112.6)
274 (24%)
141 (9%)
298 (19%)
321 (20%)
439 (28%)
96.7C (107.3)
49 (23%)
18 (27%)
449 (29%)
14,098A
(19,156)
18.8A (20.9)
29,781B
(35,011)
37.7B (29.9)
18,573C
(22,149)
28.7C (25.3)
0.6A (0.4)
0.8B (0.3)
0.8B (0.3)
73 (37%)
10 (16%)
521 (35%)
90,651
(250,493)
192,581
(631,048)
200,457
(190,687)
45,128
(244,843)
143,489
(193,774)
217,794
(323,540)
254,321
(265,397)
54,061
(151,413)
94,601
(228,528)
232,745
(2,256,016)
196,769
(274,144)
91,432
(1,466,785)
Significant difference between offenders fulfilling different roles are indicated per variable
(†p < 0.10, ∗p < .05, ∗∗p < 0.01,∗∗∗p < .001). Within each row, different superscripts indicate a
significant difference between offenders with different roles (p < 0.05). For example, A and B differ
significantly; AB differs from neither A nor B
a
For privacy reasons, frequencies lower than ten are not reported
324
V. van der Geest et al.
Table 6 Effect of employment on crime differentiated by role in criminal organization
Control variables
Age
Age2
Employment
Employed (for at least a half year)
Log likelihood
Model 3
Leaders
B (SD)
Model 4
Coordinators
Model 5
Other role
−.06∗ (.03)
.00 (.00)
.21∗∗∗ (.06)
−.00∗∗∗ (.00)
.06∗∗∗ (.01)
−.00∗∗∗ (.00)
.27∗∗ (.10)
−1807.45
.38∗ (.18)
−426.48
−.07∗ (.03)
−13,832.14
†p < 0.10, ∗p < .05, ∗∗p < 0.01,∗∗∗p < .001
ffending and Life Outcomes Distinguished by Type
O
of Organized Crime
Descriptives of the Type of Organized Crime
Offenders do not only fulfill different roles within a criminal group, but are also
involved in different types of organized crime (Table 1). The majority (60%) was
involved in drug-related activities: traditional drugs (32%), synthetic drugs (8%) or
both (20%). Smaller numbers were involved in human smuggling (6%), human trafficking (4%), or cybercrime (1%). One out of five was involved in organized fraud.
Nine percent of the offenders was involved in other types of organized crime.
ink Between Employment and Crime: Different Types of Organized
L
Crime
On average, offenders in each subgroup were involved in crime for the first time
between age 24 and 30 (Table 7). However, drugs offenders (26 years) and those
involved in other activities (24 years), were younger at time of their first offence
than those involved in human trafficking (29 years), and fraud (30 years). At the
time of the organized crime cases, offenders involved in organized fraud (39 years)
were significantly older than those involved in human smuggling (32 years). During
their criminal career, offenders involved in organized drug-related (12 crimes) or
other activities (14 crimes) committed significantly more crimes than those involved
in human smuggling (6 crimes), human trafficking (8 crimes), or organized fraud (9
crimes). Also, they committed more moderate and serious crimes than those
involved in other organized crime activities. Relatedly, offenders involved in drug
activities in organized crime, spent more time in prison during their lives than all
other groups.
In terms of life outcomes, fraud offenders distinguish themselves from all other
organized crime offenders. Compared to offenders in other types of organized
crime activities (drugs, human smuggling, human trafficking, other activities),
Delinquent Development, Employment and Income in a Sample of Dutch Organized…
325
Table 7 Offending distinguished by type of organized crime
Human
trafficking Fraud
Other
(N = 73)
(N = 389) (N = 191)
Human
smuggling
Drugs
(N = 1153) (N = 115)
Mean (SD) / N (%)
25.7AB
27.7AC (7.3)
(9.8)
38.9A
32.2B (8.9)
(10.1)
29.1C (9.8) 29.9C
(11.2)
35.0AB
38.6AC
(8.5)
(8.8)
24.3B
(11.1)
35.5BC
(8.9)
Total criminal career
One-shot offender∗∗∗
2–5 crimes∗∗∗
71 (6%)
18 (16%)
315 (27%) 48 (42%)
15 (21%)
23 (32%)
16 (8%)
50 (26%)
6–10 crimes†
>10 crimes∗∗∗
287 (25%) 32 (28%)
473 (41%) 16 (14%)
20 (27%)
15 (21%)
Number of crimes∗∗∗
6.0B (5.6)
7.9B (8.8)
Violence∗∗∗
11.9A
(11.4)
1.1A (2.0)
0.3B (0.7)
Property∗∗∗
2.2A (3.9)
0.9B (1.4)
Drugs∗∗∗
Other∗∗∗
Number of minor crimes (<
4 years punishment
threat)∗∗∗
Number of moderate crimes
(4–8 years punishment
threat)∗∗∗
Number of serious crimes
(> = 8 years punishment
threat)∗∗∗
At least one prison
sentence∗∗∗
Number of prison
sentences∗∗∗
Time spent in prison
(years)∗∗∗
Organized crime case
Prison sentence∗∗∗
Length of prison sentence
(years)∗∗∗
1.2A (1.4)
7.4A (7.3)
7.0A (7.0)
0.1B (0.4)
4.7B (4.8)
3.9B (4.6)
1.0ABC
0.6B (1.4)
(2.2)
1.4AB (2.3) 2.0AB
(3.5)
0.1BC (0.4) 0.4BC (1.0)
5.4AB (5.6) 5.7B (6.2)
4.5BC (5.4) 5.3BC (6.1)
3.8A (5.3)
1.8B (1.8)
2.5AB (4.0) 2.7B (4.4)
1.1A (1.3)
0.3B (0.5)
0.9AC (1.1) 0.5BC (1.1) 1.0A (1.5)
Age at first crime∗∗∗
Age at criterion case∗∗∗
904 (78%) 94 (82%)
52 (13%)
157
(40%)
73 (19%)
107
(28%)
8.6B (9.7)
2.9AC (3.8)
1.4B (1.2)
242
(62%)
1.8AB (2.6) 1.7B (3.1)
2.9A (4.2)
1.5B (2.1)
1.7B (2.8)
465 (40%) 62 (54%)
1.1A (2.1) 0.8AB (1.3)
54 (74%)
1.2B (2.5)
26 (36%) 91 (23%)
0.7AC (1.8) 0.2C (0.7)
44 (23%)
81 (42%)
13.8A
(15.1)
1.6C (2.5)
4.1C (8.1)
0.6C (1.2)
7.6A (7.3)
7.0AC (6.9)
5.9C (9.6)
136
(71%)
3.5C (5.1)
1.5B (2.9)
61 (32%)
0.4BC (1.0)
Significant difference between offenders fulfilling different roles are indicated per variable
(†p < 0.10, ∗p < .05, ∗∗p < 0.01,∗∗∗p < .001). Within each row, different superscripts indicate a
significant difference between offenders involved in different types of organized crime (p < 0.05).
For example, A and B differ significantly; AB differs from neither A nor B
326
V. van der Geest et al.
organized fraud offenders attained a higher educational level, more often were
employed and for longer periods of time, had higher incomes, less often received
social benefits, and had substantially higher property values (Table 8). Although
the absolute value of the debts of organized fraud offenders also is the highest out
of the five groups, the difference with debts of the others groups did not reach significance. Also, no effect was found of employment on crime for any of the subgroups (Table 9).
ffending and Life Outcomes Distinguished by Offending
O
Trajectories Over the Life-Course
escription of Developmental Trajectories and Their Link to Offending
D
Characteristics
A six-group model was selected as the optimal model to fit the criminal careers of
the 19133 organized crime offenders (Appendix A). Figure 3 provides a graphical
representation of the criminal careers of the six distinguished groups. Offending
characteristics of each of the six distinct groups are presented in Table 10. The first
three trajectory groups are named after the specific onset ages of the developmental
group. Their criminal pathways have similar shapes, but they started and peaked at
different stages in life. First, early-onset offenders are, together with high-frequency
offenders, the first to have started their criminal career at age 17. Around age 32,
they were again one of the youngest trajectory groups at the time of the criterion
case in organized crime. Nine out of ten early-onset offenders committed more than
10 crimes and 94% spent some time in prison during their careers. Mid-onset
offenders started offending a couple of years later, but they resemble early-onset
offenders in that they relatively often accumulated a large number of crimes (92%
more than 10 crimes) and also relatively often were convicted to prison at least once
(89%). Late-onset offenders committed their first crime only around age 28 and
were halfway their 40s at the time of their criterion case in organized crime. Three
out of four are chronics (> 10 crimes) and, on average, they also committed fewer
crimes than those with an early- or mid-onset start in crime. A fourth trajectory
group is labelled low-frequency offenders; they were 22 years old when they committed their first crime, and committed fewer crimes in their careers than the first
three groups. Only 13% of the low-frequency offenders committed more than 10
crimes. High-frequency offenders started as early as early-onset offenders, but all
committed more than 10 crimes, with an average of 47 crimes. They did not only
commit the most minor crimes, but also the most moderate and serious crimes of all
trajectory groups. All high-frequency offenders spent some time in prison and, on
average, they also spent the most time in prison. Most individuals (33%) were
The original sample contained 1921 offenders, but 8 offenders were excluded due to missing
values.
3
Delinquent Development, Employment and Income in a Sample of Dutch Organized…
327
Table 8 Life outcomes distinguished by type of organized crime
Human
trafficking
(N = 73)
Fraud
(N = 389)
Other
(N = 191)
23 (20%)
12 (10%)
<10
12 (16%)
<10
<10
37 (10%)
28 (7%)
15 (4%)
30 (16%)
27 (14%)
<10
≈10
<10
56 (49%)
<10
<10
42 (58%)
44 (11%)
28 (7%)
236 (61%)
45 (24%)
≈10
66 (35%)
31 (27%)
24 (33%)
73 (20%)
36 (19%)
10 (9%)
27 (32%)
16 (14%)
31 (27%)
88.1AB
(108.9)
3 (4%)
19 (26%)
16 (22%)
11 (15%)
69.3A (89.1)
32 (8%)
77 (20%)
83 (21%)
124 (32%)
111.0B
(112.2)
32 (17%)
37 (19%)
35 (18%)
51 (27%)
93.0AB
(105.5)
26 (23%)
15 (21%)
129 (33%)
51 (27%)
14,824A
(11,854)
11,062A
(12,440)
25,680B
(32,413)
18,085A
(21,920)
24.3AB
(22.8)
0.8 (0.3)
17.9B (21.9) 33.0C (29.3)
0.7 (0.4)
0.8 (0.3)
28.8AC
(24.7)
0.8 (0.3)
55 (54%)
27 (43%)
95 (26%)
78 (42%)
37,138A
(91,536)
52,492AB
(147,573)
182,593
(81,950)
3764
(21,084)
37,591A
(79,939)
60,091AB
(115,348)
159,018
(121,406)
4552
(19,947)
172,584B
(370,213)
531,494B
(4,419,035)
241,483
(255,484)
239,102
(2,832,475)
86,174A
(177,562)
189,318AB
(925,298)
221,413
(262,968)
80,326
(641,198)
Human
Smuggling
Drugs
(N = 1153) (N = 115)
Mean (SD)/N (%)
Highest educational level∗∗
Elementary education
176 (15%)
Prevocational education 132 (11%)
Selective secondary
34 (3%)
education
Vocational training
128 (11%)
Higher education
39 (3%)
Unknown
644 (56%)
Employed†
Never during
303 (26%)
observation period
0–0.5 year
91 (8%)
0.5–3.0 years
228 (20%)
3.0–7.0 years
232 (20%)
> 7 years
299 (26%)
89.6A
λ (mean number of
employed days during the (103.3)
observation period)∗∗
315 (27%)
Ever self-employed
during observation
period†
16,819A
Mean income per
observed year (in
(18,737)
euros)∗∗∗
Mean income percentile
27.1A (24.0)
per observed year∗∗∗
0.7 (0.3)
Proportion of observed
years with positive
income†
369 (34%)
Ever received social
benefits during
observation period∗∗∗
Main property value∗∗∗
78,928A
(174,719)
Total property value∗
148,028A
(572,859)
Mortgage debt
179,211
(278,524)
Debts (other than
42,278
mortgage)
(443,414)
Significant difference between offenders involved in different types of organized crime are indicated per variable (†p < 0.10, ∗p < .05, ∗∗p < 0.01,∗∗∗p < .001). Within each row, different superscripts indicate a significant difference between offenders involved in different types of organized
crime (p < 0.05). For example, A and B differ significantly; AB differs from neither A nor B
328
V. van der Geest et al.
Table 9 Effect of employment on crime differentiated by type of organized crime
Model 6
Drugs
B (SD)
Control variables
Age
.04∗∗ (.01)
Age2
−.00∗∗∗ (.00)
Employment
−0.00 (.04)
Employed
(for at least
a half year)
Log
−10,231.07
likelihood
Model 7
Human
smuggling
Model 8
Human
trafficking
Model 9
Fraud
Model 10
Other offence
.03 (.05)
−.00∗∗ (.00)
.04 (.05)
−.00∗∗ (.00)
.12∗∗∗ (.02)
−.00∗∗∗ (.00)
.08∗∗∗ (.02)
−.00∗∗∗ (.00)
−.20 (.18)
.02 (.18)
−.02 (.07)
−.10 (.09)
−687.37
−512.77
−3027.56
−2050.00
†p < 0.10, ∗p < .05, ∗∗p < 0.01,∗∗∗p < .001
2
High-frequency offenders (3.9%)
Nr. of convictions
1.5
Late-onset offenders (12%)
Mid-onset offenders (9.7%)
1
Early-onset offenders (11.2%)
0.5
Low-frequency offenders (29.8%)
Sporadic offenders (33%)
0
12
20
28
36
Age
44
52
60
Fig. 3 Developmental trajectories of offending from age 12 to 65
assigned to a trajectory group named sporadic offenders. At age 37, individuals
assigned to this group had the latest onset age of all groups. One out of four sporadic
offenders had no other judicial contacts than the criterion case in organized crime
and only 1% committed more than 10 crimes in total. As we would expect from
their low-frequency offending trajectory, sporadic offenders committed significantly less crimes (3 in total) and less often spent time in prison (56%) compared to
all other offender groups.
Offenders assigned to trajectories with a lower offence frequency, seem to do
better on employment outcomes. Low-frequency offenders and sporadic offenders,
for example, are most often employed 7 years or more during the observation period,
on average have higher numbers of employed days per year during the observation
period, and also have higher incomes than individuals in most of the other trajectory
groups (Table 11). High-frequency offenders have the lowest employment outcomes, together with the early- and mid-onset offenders; they are less often
employed, have lower incomes, and more often received social benefits. No effect
for employment on crime was found for any of the trajectory groups (Table 12).
Delinquent Development, Employment and Income in a Sample of Dutch Organized…
329
Table 10 Offending distinguished by trajectory group
Early-­
Mid-onset
onset
offenders offenders
(N = 215) (N = 186)
Mean (SD) / N (%)
16.7A (2.7) 19.6B (3.6)
Age at first
crime∗∗∗
Age at criterion
32.3A (6.7)
case∗∗∗
Total criminal career
One-shot
0 (0%)
offender∗∗∗
2–5 crimes∗∗∗
1 (1%)
6–10 crimes∗∗∗
19 (9%)
>10 crimes∗∗∗
195 (91%)
Number of
19.3A (6.9)
crimes∗∗∗
Violence∗∗∗
2.2A (2.1)
Property∗∗∗
4.6A (4.1)
Drugs∗∗∗
Other∗∗∗
Low-­
Late-onset frequency
offenders offenders
(N = 232) (N = 573)
High-­
frequency Sporadic
offenders offenders
(N = 75) (N = 640)
28.1C (6.3) 22.3D (4.7)
16.4A
(3.6)
36.8B
(8.0)
42.5C
(10.7)
37.3B (7.7) 44.7C (8.1) 32.7A (6.9)
0 (0%)
0 (0%)
7 (1%)
0 (0%)
165 (26%)
1 (1%)
14 (8%)
171 (92%)
21.6B (7.8)
3 (1%)
57 (25%)
172 (74%)
14.3C (5.9)
233 (41%)
258 (45%)
75 (13%)
6.7D (3.2)
355 (56%)
108 (17%)
4 (1%)
3.2B (2.3)
2.1A (2.2)
3.6B (3.4)
1.1B (1.5)
1.9C (2.2)
0.5C (0.8)
1.0D (1.2)
0 (0%)
0 (0%)
75 (100%)
47.3E
(16.7)
5.4C (4.6)
16.2E
(11.3)
1.8B (1.9)
23.9D
(12.3)
21.9D
(11.8)
1.2A (1.4) 1.5AB (2.0) 1.3A (1.4) 0.7C (0.9)
11.2A (5.4) 14.4B (6.0) 10.0A (5.1) 4.6C (2.7)
Number of minor 10.4A (5.5)
crimes (< 4 years
punishment
threat)∗∗∗
7.3A (5.0)
Number of
moderate crimes
(4–8 years
punishment
threat)∗∗∗
Number of serious 1.6A (1.6)
crimes (> = 8 years
punishment
threat)∗∗∗
At least one prison 203 (94%)
sentence∗∗∗
Number of prison 4.7A (3.1)
sentences∗∗∗
Time spent in
3.6A (4.2)
prison (years)∗∗∗
Organized crime case
Prison sentence
77 (36%)
Length of prison
1.0A (1.8)
sentence (years)∗
36.8E (9.9)
0.2D (0.5)
0.6D (0.8)
0.4D (0.7)
2.0E (2.0)
13.7B (5.8) 9.7A (5.0)
4.2C (2.7)
1.8E (1.9)
6.4A (4.6)
3.7B (2.9)
1.8C (1.6)
22.4D
(11.6)
1.0E (1.0)
1.5A (1.5)
1.0B (1.1)
0.6C (0.8)
3.1D (2.4)
0.5E (0.6)
166 (89%) 200 (86%) 425 (74%)
75 (100%) 361 (56%)
4.6A (3.8)
2.8B (2.6)
1.4C (1.4)
3.9A (5.2)
2.9A (4.1)
1.8B (2.8)
14.5D
(7.2)
6.8C (5.8)
1.1D (2.4)
68 (37%)
0.9A (1.9)
89 (38%)
1.0A (1.9)
224 (39%)
0.9A (1.7)
28 (37%)
1.1A (2.0)
219 (34%)
0.7A (1.6)
0.8E (0.9)
Significant difference between the trajectory groups are indicated per variable (†p<0.10, ∗p<.05,
∗∗p<0.01,∗∗∗p< .001). Within each row, different superscripts indicate a significant difference
between trajectory groups (p < 0.05). For example, A and B differ significantly; AB differs from
neither A nor B. Link between offending trajectory and employment
330
V. van der Geest et al.
Table 11 Life outcomes distinguished by trajectory group
EarlyMid-onset
onset
offenders offenders
(N = 215) (N = 186)
Mean (SD) / N (%)
Highest educational level∗∗∗
Elementary
40 (19%) 39 (21%)
education
Prevocational
22 (10%) 25 (13%)
education
< 10
< 10
Selective
secondary
education
Vocational
30 (14%) 17 (9%)
training
Higher education 12 (6%)
11 (6%)
Unknown
111 (52%) 94 (51%)
Employed∗∗∗
Never during
42 (20%) 48 (26%)
observation period
0–0.5 year
26 (12%) 24 (13%)
0.5–3.0 years
53 (25%) 59 (32%)
3.0–7.0 years
50 (23%) 40 (22%)
> 7 years
44 (21%) 25 (13%)
77.0A
λ (mean number
60.5AB
of employed days (84.5)
(77.1)
during the
observation
period)∗∗∗
55 (26%) 62 (33%)
Ever self-­
employed during
observation
period†
Mean income per 11,349
13,503
observed year (in (13,048)A (17,946)AB
euros)∗∗∗
31.3
Mean income
33.6
(19.8)A
percentile per
(21.2)AB
observed year∗∗∗
0.6 (0.3)A 0.7 (0.3)AB
Proportion of
observed years
with positive
income∗∗∗
83 (40%) 75 (41%)
Ever received
social benefits
during
observation
period∗∗∗
Late-onset
offenders
(N = 232)
Lowfrequency
offenders
(N = 573)
High-­
frequency Sporadic
offenders offenders
(N = 75) (N = 640)
29 (13%)
73 (13%)
22 (29%)
75 (12%)
19 (8%)
85 (15%)
12 (16%)
42 (7%)
< 10
< 10
< 10
< 10
20 (9%)
84 (15%)
10 (13%)
75 (12%)
15 (6%)
51 (9%)
< 10
149 (64%) 280 (49%) 30 (40%)
68 (11%)
380 (59%)
77 (33%)
106 (19%) 18 (24%)
176 (28%)
23 (10%)
50 (22%)
42 (18%)
47 (20%)
70.5AB
(95.0)
37 (6%)
108 (19%)
127 (22%)
195 (34%)
113.9C
(110.4)
22 (29%)
20 (27%)
11 (15%)
4 (5%)
35.3B
(53.5)
36 (6%)
125 (20%)
112 (18%)
201 (31%)
105.2C
(115.4)
80 (35%)
147 (26%) 17 (23%)
175 (27%)
18,722
(23,424)BC
18,271
(19,987)B
9907
(7959)A
23,576
(27,317)C
38.8
(23.5)BC
40.3
(23.7)C
27.0
(15.2)AB
44.6 (24.9)D
0.7 (0.3)BC
0.7 (0.3)C
0.7 (0.3)AC 0.8 (0.3)D
59 (26%)
196 (37%) 43 (57%)
68 (28%)
(continued)
Delinquent Development, Employment and Income in a Sample of Dutch Organized…
331
Table 11 (continued)
Main property
value∗∗∗
Total property
value
Mortgage debt†
Debts (other than
mortgage)
EarlyMid-onset
onset
offenders offenders
(N = 215) (N = 186)
Mean (SD) / N (%)
49,961A
67,137A
(127,912) (128390)
173,493
151,485
(986,225) (571,628)
160,232
134,947
(158,204) (122,165)
75,045
29,118
(625,224) (202,548)
Late-onset
offenders
(N = 232)
Lowfrequency
offenders
(N = 573)
High-­
frequency Sporadic
offenders offenders
(N = 75) (N = 640)
110,671AB
(232,233)
248,003
(986,861)
252,657
(539,334)
108,909
(895,649)
75,344A
(170,029)
109,140
(315,236)
183,121
(169,941)
20,339
(180,173)
17,308A
(62,634)
57,805
(312,941)
92,110
(103,100)
21,023
(167,805)
141,341B
(311,585)
377,778
(3,484,204)
223,635
(231,597)
155,551
(2,235,473)
Significant difference between trajectory groups are indicated per variable (†p < 0.10, ∗p < .05,
∗∗p < 0.01,∗∗∗p < .001). Within each row, different superscripts indicate a significant difference
between trajectory groups (p < 0.05). For example, A and B differ significantly; AB differs from
neither A nor B
Table 12 Effect of employment on crime differentiated by trajectory group
Model 11
Early-­onset
offenders
B (SD)
Control variables
Age
.26∗∗∗
(.03)
Age2
−.01∗∗∗
(.00)
Employment
.02 (.06)
Employed
(for at least a
half year)
Log
−3713.70
likelihood
Model 14
Low-­
frequency
offenders
Model 15
High-­
frequency
offenders
Model 16
Sporadic
offenders
Model 12
Mid-­onset
offenders
Model 13
Late-­onset
offenders
.05∗ (.02)
.21∗∗∗ (.03) .07∗∗ (.02)
−.00∗∗∗
(.00)
.19∗∗∗
(.02)
−.00∗∗∗
(.00)
−.00∗∗∗
(.00)
.13∗∗∗
(.03)
−.00∗∗∗ (.00) −.00∗∗∗
(.00)
.02 (.07)
−.00 (.07)
−.10 (.08)
−.05 (.10)
−.01 (.09)
−2549.63
−2805.67
−2786.22
−1728.77
−2745.58
†p < 0.10, ∗p < .05, ∗∗p < 0.01,∗∗∗p < .001
Discussion
This chapter focused on the criminal careers of 1921 offenders from the Dutch
Organized Crime Monitor and analyzed delinquent development and relationships
with socio-economic variables such as employment and income. Next to many
detailed findings for various subgroups on the criterion case, development of
offending, educational level, employment and income, the most important conclusions are the following. First, organized crime offenders, on average were 27 years
332
V. van der Geest et al.
old when their first judicial contact took place and, compared to the traditional
age-crime curve (e.g. Gottfredson and Hirschi 1990), offending stayed relatively
high and only started dropping to a lower level from age 50 on. This is similar to
findings in previous studies on Dutch organized crime offenders, in which age of
onset ranges between 24–27 (Kleemans and De Poot 2008; Van Koppen et al.
2010a. Also Savona et al. (2020), find that mafia members committed their first
crime at on average age 25. Their analysis of trajectories reveals roughly similar
patterns, with a small group of persistent high-frequency offenders. In studies in
the UK and Australia, organized crime offenders are slightly younger at their first
offence, but this is also true for general offenders (Francis et al. 2013; Fuller et al.
2019). Second, no effect was found of employment on crime for the total sample.
This finding is markedly different from earlier studies on general offender samples, that identified an effect of employment on crime (Van der Geest et al. 2011;
Laub and Sampson 2003). Studies on white-collar crime offenders, however, show
that employment can also provide specific opportunities that lead offenders into
crime (Weisburd et al. 2001; Van Onna 2018). Similarly, in organized crime certain
occupations may present opportunities for committing crimes, for example through
travel movements or international contacts, and depending on the nature of the
occupation, the effect of employment on crime may be differential. Third, interesting findings emerged from analyses where individuals were distinguished based on
their role in a criminal organization. Both leaders and coordinators show a different pattern than is standard in the literature on the relationship between employment and crime: both for leaders and coordinators, a significant positive effect of
employment on crime was found. Employment significantly increases offending
with 31% for leaders and with 46% for coordinators. The only group that benefits
from employment, are those with other roles; employment accounts for a crime
reduction of 7% for this subgroup. Fourth, no effect was found of employment on
crime for subgroups distinguished by type of organized crime activity. Fifth, trajectory analyses resulted in the selection of a model with six groups: high-­frequency
offenders (3.9%), early-onset offenders (11.2%), mid-onset offenders (9.7%), lateonset offenders (12%), low-frequency offenders (29.8%), and sporadic offenders
(33%). Sixth, offenders assigned to trajectories with a lower offence frequency,
seem to do better on employment outcomes. No effect for employment on crime
was found for any of the trajectory groups.This study describing long-term criminal career characteristics and differential effects of employment on crime in a
sample of organized crime offenders, has added new findings to literature on work
and crime. Work settings may provide new opportunities for organized crime
activities, as is demonstrated by qualitative research (e.g. Kleemans and Van de
Bunt 2008; Madarie and Kruisbergen 2020). Therefore, the received wisdom that
employment has a preventive effect on crime does not seem to hold for careers in
organized crime. An interesting finding is that the effect of employment may differ
for different roles in criminal organizations. Both for leaders and coordinators, we
found that employment actually increases offending, whereas for other roles
employment led to a (small) reduction in crime. Testing to what extent the effect
also differs by the type of occupation was beyond the scope of this chapter, and
Delinquent Development, Employment and Income in a Sample of Dutch Organized…
333
also the role of self-employment in organized crime remains largely unknown.
These findings call for more research on the link between employment and organized crime.
Acknowledgements The data used in this chapter are part of a continuing research project, the
Dutch Organized Crime Monitor, combined with information from the Dutch Judicial
Documentation System and Statistics Netherlands. We are grateful to all past and present members
of the Dutch Organized Crime Monitor research group for their efforts and particularly to Edwin
Kruisbergen for his contribution to this specific study. We also thank the members of the Recidivism
Monitor team of the Research and Documentation Centre and our contact persons at Statistics
Netherlands for their data deliveries and helpful support to this study.
Bayesian Information Criterion Values per Model
Number of groups
1
2
3
4
5
6
7
Bayesian Information
Criterion
−49,603.19
−46,259.48
−45,667.88
−45,197.78
−44,952.59
−44,834.29
−44,848.75
Zero-Inflated Poisson quadratic model with six groups
Group
Early-onset
Variable
Offenders
n
215
Estimated model parameters
Intercept
−2.19∗
Linear
2.01∗
Quadratic
−.41∗
Model characteristicsa
Mean group
.84
probabilities
Inflation
−.53∗
parameter (α)
∗
p < .05
Based on a six-group model
a
Mid-onset
Offenders
186
Late-onset
Offenders
232
Low-­
frequency
Offenders
573
High-­
frequency
Offenders
75
Sporadic
Offenders
640
−4.49∗
2.77∗
−.40∗
−7.53∗
3.36∗
−.38∗
−6.77∗
4.01∗
−.64∗
1.21∗
−.18∗
–
−8.06∗
2.96∗
−.31∗
.81
.83
.78
.91
.86
−.75∗
−.52∗
−.32∗
−.57∗
.32∗
334
V. van der Geest et al.
References
Blokland, A., & Van der Geest, V. (2017). International handbook of criminal careers and lifecourse criminology. London: Routledge.
Farrington, D. P. (2003). Developmental and life-course criminology: Key theoretical and empirical studies – The 2002 Sutherland award address. Criminology, 41, 221–255.
Fijnaut, C., Bovenkerk, F., Bruinsma, G., & Van de Bunt, H. (1998). Organised crime in the
Netherlands. The Hague: Kluwer Law International.
Francis, B., Humphreys, L., Kirby, S., & Soothill, K. (2013). Understanding criminal careers in
organised crime. Research Report, 74, Department of mathematics and statistics and department of applied social science, Lancaster University.
Fuller, G., Morgan, A., & Brown, N. (2019). Criminal histories of Australian organised crime
offenders. Trends and Issues in Crime and Criminal Justice, 567, 1–6.
Gottfredson, M. R., & Hirschi, T. (1990). A general theory of crime. Stanford: Stanford University
Press.
Kleemans, E. R. (2007). Organized crime, transit crime, and racketeering. Crime and Justice: A
Review of Research, 35, 163–215.
Kleemans, E. R. (2014). Organized crime research: Challenging assumptions and informing policy. In E. Cockbain & J. Knutsson (Eds.), Applied police research: Challenges and opportunities (pp. 57–67). London: Routledge.
Kleemans, E. R., & De Poot, C. J. (2008). Criminal careers in organized crime and social opportunity structure. European Journal of Criminology, 5(1), 69–98.
Kleemans, E. R., & Van de Bunt, H. G. (2008). Organised crime, occupations, and opportunity.
Global Crime, 9(3), 185–197.
Laub, J., & Sampson, R. (2003). Shared beginnings, divergent lives: Delinquent boys to age 70.
Cambridge, MA: Harvard University Press.
Madarie, R., & Kruisbergen, E. W. (2020). Traffickers in Transit: Analysing the logistics and
involvement mechanisms of organized crime at logistical nodes in the Netherlands: Empirical
results of the Dutch Organised Crime Monitor. In D. Weisburd, E. U. Savona, B. Hasisi, &
F. Calderoni (Eds.), Understanding Recruitment to Organized Crime and Terrorism. Cham:
Springer International Publishing.
Nagin, D. S. (2005). Group-Based Modeling of Development. Cambridge, MA: Harvard University
Press.
Nagin, D. S., Farrington, D. P., & Moffitt, T. E. (1995). Life-course trajectories of different types
of offenders. Criminology, 33, 111–139.
Reuter, P. (1983). Disorganized crime: Illegal markets and the mafia. Cambridge, MA: MIT Press.
Savona, E. U., Calderoni, F., Campedelli, G. M., Comunale, T., Ferrarini, M., & Meneghini, C.
(2020). The criminal careers of Italian mafia members. In D. Weisburd, E. U. Savona, B. Hasisi,
& F. Calderoni (Eds.), Understanding Recruitment to Organized Crime and Terrorism. Cham:
Springer International Publishing.
Statistics Netherlands. (August 13, 2018). Statline. https://opendata.cbs.nl/statline/#/CBS/nl/
Van der Geest, V. R. (2011). Working their way into adulthood: Delinquency and employment in
high-risk boys to age 32. Doctorate thesis.
Van der Geest, V. R., Bijleveld, C. C. J. H., & Blokland, A. A. J. (2011). The effects of employment
on longitudinal trajectories of offending: A follow-up in high risk youth from ages 12 to 32.
Criminology, 39(4), 1195–1234.
Van Onna, J. (2018). Blurred lines: A study of white-collar crime involvement. PhD thesis, VU
University Amsterdam: Joost van Onna.
Van Koppen, M. V. (2013). Involvement mechanisms for organized crime. Crime, Law and Social
Change, 59(1), 1–20.
Delinquent Development, Employment and Income in a Sample of Dutch Organized…
335
Van Koppen, M. V., De Poot, C. J., & Blokland, A. A. J. (2010a). Comparing criminal careers
of organized crime offenders and general offenders. European Journal of Criminology, 7(5),
356–374.
Van Koppen, M. V., De Poot, C. J., Kleemans, E. R., & Nieuwbeerta, P. (2010b). Criminal trajectories in organized crime. The British Journal of Criminology, 50(1), 102–123.
Weisburd, D., Waring, E., & Chayet, E. F. (2001). White-collar crime and criminal careers.
Cambridge, UK: Cambridge University Press.
Open Access This chapter is licensed under the terms of the Creative Commons Attribution
4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use,
sharing, adaptation, distribution and reproduction in any medium or format, as long as you
give appropriate credit to the original author(s) and the source, provide a link to the Creative
Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter’s Creative
Commons license, unless indicated otherwise in a credit line to the material. If material is not
included in the chapter’s Creative Commons license and your intended use is not permitted by
statutory regulation or exceeds the permitted use, you will need to obtain permission directly from
the copyright holder.
Index
A
Absolute mobility, 216
Action against Terrorism Unit (ATU), 2
Activism-Radicalism-Intentions-Scales
(ARIS), 39
Addenbrooke’s Cognitive Examination-­
Revised (ACE-R), 271
Al-Qaeda and its associated movements
(AQAM), 131
Al Qaida violent extremism, 29, 30
Amsterdam Airport Schiphol, 281, 284
Anti-Mafia Investigative Directorate
(DIA), 180
Antisocial personality disorder, 269–270
Apulian mafia, 254
Article 83a, 150
Authorship, 38, 39
Autonomy, 302
B
Behavioral radicalization, 33
Bottoms-Tankebe model, 107
Brokers, 294
C
Calderoni Mean Index, 218, 227
Calderoni Rank Index, 218, 227
“Camorra”, 246, 251
Casellario dataset, 242
Cocaine, 304–306
The Code of Criminal Procedure, 150
Cognitive radicalization, 33
Conceptualization, 31
Consensus, 31
Consumption inequality, 207, 218,
227–232, 237
CONTEST, 110
Control theory, 70
Control variables, 135
Co-offenders, 12
Counter-terrorism
domestic and international
audiences, 106
dynamic relationship, 106
experimental designs, 106
investigations, 140
issues, 115
nature, 115
outcomes, 106
police legitimacy, 106
policing, 109
practices, 105, 106, 115
raid, 113
in UK, 106, 110–111
unintended negative effects and
outcomes, 105
Counter-terrorism and Security Act 2015, 110
Counter-terrorism policing, 9, 10
Crime prevalence, 124
Crime prevention, 110
Crime scripts, 279, 282, 283
Crimes of Terrorism Act in 2004, 149–151,
155, 166
Crime specialization, 124, 125
Crime-terror link, 152
Criminal activity
history, 140
prevalence, 140
Criminal behaviour, 11, 124, 140, 149, 176,
269, 273
© Springer Nature Switzerland AG 2020
D. Weisburd et al. (eds.), Understanding Recruitment to Organized Crime
and Terrorism, https://doi.org/10.1007/978-3-030-36639-1
337
338
Criminal careers, 11, 176
Italian Mafiosi, 244
Apulian mafia, 254
Camorra mafia, 251
characteristics, 254
de-escalation, 259
macro level, 241, 245, 247
mafia association, 250
meso level, 241, 246, 247
micro level, 241, 246, 247, 258
‘Ndrangheta mafia, 254
organizations, 251, 253, 254
PMM, 242, 243, 245
preliminary analysis, 258
PROTON, 241, 264, 265
recruitment, 258–261
Sicilian mafia, 251, 252, 254
variables and parameters, 253
trajectories
employment, 309, 310
OCM (see Dutch Organized Crime
Monitor (OCM))
offending trajectories (see offending
trajectories)
organized crime offenders, 309
work and crime, 332
Criminal gangs, 178
Criminal history
disadvantages, 140
non-ideological offending, 141
stigmatization, 140
Criminal involvement, 110
Criminality, 13
Criminal networks, 176, 285
Criminal offenders, 91
Criminal organizations, 179
average age, 255, 257, 264
criminal careers (see Criminal careers)
early and late recruits, 255, 257
employment (see Employment)
individuals, 332
Italian mafia organizations, 258
life outcomes, 323
mafia offenders, 254
offenders, 310
recruitment, 263
roles, 321, 322
types, Italian mafias, 250
Criminal recidivism, 89, 91, 99
Criminal record
age of onset, 125, 126
crime specialization, 124, 125
criminological investigations, 123
descriptive analysis (see Descriptive
analysis, crime rates)
Index
diversity, 124, 125
limitations, 139–140
multivariate logistical analysis, 134–136
PIRUS (see Profiles of Individual
Radicalization in the United States
(PIRUS) database)
and political violence, 123–124
pre-radicalization criminality, 126
previous criminal behavior, 123, 124
U.S. extremists (see U.S. extremists)
violent crime, 125, 126
Criminal skills, 194
Criminal trajectories, 11
Italian Mafiosi, 241, 242
early starters, 250
GBTM, 247, 248
high frequency offenders, 248
high persistence offenders, 250
juvenile delinquents, 247
low frequency offenders, 249
moderate frequency offenders, 249
population, 248
sexual crimes, 247
“Criminal training”, 259
Criminogenic factors, 49, 124
Criminological research, 196
Criminologists, 32
Criminology, 86, 121, 122, 139
Criminotrophic factors, 9, 49
D
“Dark number” issue, 197
Data sources, 40
Defying security checks, 286, 300
Delinquency, 123
Delinquent development, Dutch
organized crime
criminal organization (see Criminal
organization)
OCM (see Dutch Organized Crime
Monitor (OCM))
offending trajectories (see Offending
trajectories)
types, 324
drug-related activities, 324
employment and crime, 324, 326, 328
life outcomes, 327
offending, 325
Delinquent trajectories, see Delinquent
development, Dutch
organized crime
Democracy Index, 34
Democratic vs. non-democratic countries, 34
Dependent variables, 28, 30, 33, 34, 39, 40
Index
De-radicalization, 85, 87
Descriptive analysis, 115
crime rates
age of crime onset, 134
PIRUS, 128
pre-radicalization, 129–131
criminal activity, pre-­radicalization, 131–133
Descriptive characteristics, 61, 62
Descriptive statistics, 25, 27
Diagnostic and Statistical Manual of Mental
Disorders (DSM), 269–271
Dichotomous variables, 48
Disruptive life experiences, 167
Distal threats, 154
Domestic and international audiences, 106
Domestic terrorism cases, 87
Drug mules, 286, 298
Drug-related charges, 132
Drug trafficking
airport vs. seaport, 289, 290
Amsterdam Airport Schiphol, 284
automated processes, 303
avoiding security checks, 285,
287–289, 300
avoiding tactic, 285
crime scripts, 282, 283
criminal activities, 298, 304
criminal networks, 285
defying security checks, 286, 300
deliberate recruitment, 301
drug mules, 298
enhancing (air)port security, 302, 303
financial setbacks, 296
financial situation, 297, 301
life events, 301
logistical nodes, 282, 303
logistics, criminal activities, 284
mechanisms, 302
money, 298–300
Netherlands, 300
neutralising security checks, 289, 301
occupational embeddedness, 290–293, 301
OCM, 283
personal motivations, 296, 301
required skills and assets, 290
smuggling methods, 286, 303
social bonds, 300, 301
social embeddedness, 293–295
social snowball method, 298
social ties, 298
social welfare payment, 297
threats of violence, 301
types, 285
Drug trafficking organizations (DTOs), 10, 11,
178, 179, 181, 191, 197, 198
339
Dutch identity and society, 166
Dutch Ministry of Justice, 150
Dutch Muslim, 151
Dutch Offender Index (OBJD), 309, 314, 315
Dutch Organized Crime Monitor (OCM), 12
adult-onset offenders, 312
CBS, 315, 316
characteristics, offenders, 317
criminal careers, 311, 312
drug trafficking, 283
empirical cases, 310
employment (see Employment)
fixed effects models, 316
general offender population vs. organized
crime population, 312
group-based trajectory models, 316
individual freedom, movement and/
discretion, 313
individuals, 313
international contacts, 313
‘late onset’ offenders, 311, 312
late starters, 311, 312
life-course outcomes, 317, 319, 320
OBJD, 314, 315
OC, 310, 312
Netherlands, 310
types, 314
occupations, 313
offending, life course, 317, 320
organized crime offenders, 331
police files and extensive case, 314
police priorities, 310
social opportunity structure, 311
social relations, 311
transnational character, 311
travel movements, 313
Dutch organized crime offenders, 12
Dutch prosecution office, 155
Dutch society, 150, 167
Dynamic factor model, 207, 211, 213
E
“Early recruits”, 255–257
Economic factors, 7
Economic hardship, 167
Education, 161
Employment, 161, 162, 192
and crime, 321, 322, 324, 332
criminal organizations, 332
and income, 331
life course, 320
opportunities, 105
and work, 313
Eocio-economic factors, 10
Index
340
Escalations parameter, 245
Ethnic Minority British Election Study
(EMBES), 40
Ethnic/religious groups, 111
European context, 37, 38
European Monitoring Centre for Drugs and
Drug Addiction (EMCDDA), 280
Examined factors, 41
Exclusion criteria, 33
Experimental/quasi-experimental studies, 34, 35
Explanation-voice dimension captures, 107
Extremism, 123
attitudes and behaviour, 55
definition, 55, 71
group membership, 56
instruments, 57
non-violent, 66
and radicalization, 56
religious/ethnic, 62, 64, 68–69
right-wing, 61, 62
risk factors, 56
theories, 69
vs. society protects, 68
types, 62, 64
and violence, 67
violent, 28, 62
Extremists, language barriers in
assessments, 56
F
Financial gains, 198
Fixed effect model, 316
G
General aggression model, 70
General strain theory, 70
General theories, 70
Good Friday Agreements, 87
Grey literature, 180
Group Based Trajectory Modelling (GBTM),
247, 248
Group identity, 194
I
Identified factors, 41–43
Impartiality, 108
Inclusion criteria, 27, 28, 30–37, 46
Income inequality
and consumption inequality, 207, 218,
232, 237
SHIW, 208
vs. social mobility, 237
socio-economic mobility vs. OC, 237
Independent variables, 30
Individual-level propensity, 125
Inequality, 7
cross-sectional, 206
development, OC, 207
dynamic panel model, 217
economic conditions, 216
modified EM algorithm, 229
OC, 205, 206, 208, 218, 227
social mobility, 205
socio-economic mobility, 215, 216
Inferential statistics, 25, 27, 44
Intergroup conflict, 153
International Centre for the Prevention of
Crime (ICPC), 28
Intrusive/unpleasant practice, 116
Investigative power, 111
Islamic extremist offenders, 89
Islamic radicalization, 9
Islamic State of Iraq and Syria (ISIS), 105
Israel Prison Service (IPS)
age at time of release, 92
classification, 90
definition, 90
history of prior security convictions, 91
incarceration and individual level risk
factors, 91
ISA, 90
length of sentence served, 92
marital status, 92
National security offences, 91
offence type, 92
organizational affiliation, 92
PA, 91
security prisoners, 90
Israeli Security Agency (ISA), 90
Italian criminal organizations, 264
Italian mafia organizations, 253, 254, 258
Italian National Anti-Mafia and
Counterterrorism Directorate
(DNA), 180
Italian Parliamentary Anti-Mafia Commission
(CPA), 180
J
Jihadists, 148
Juvenile offending, 138, 139
K
Kaplan-Meyer method, 93
Index
L
“Late recruits”, 255–257
Legal authorities, 107
Legitimacy, 106, 107, 109, 111
Life-course outcomes, OC offenders, 317, 319
“Line testing”, 288
Literature
authorship, 38, 39
data sources, 40
dependent variables, 39, 40
European context, 37, 38
examined factors, 41
inclusion criteria, 35
meta-analysis, 43, 44
methodologies, 41
primary limitations, 25
proportions, 38
publications by year, 36, 37
qualities and characteristics, 26
quality and trajectory, 27
quantitative studies, 25
radicalization (see Radicalization)
Logistic regression models, 41, 158, 159
Lone-actor’ terrorism, 56
Low self-control acts, 13
Lower super output areas (LSOA), 112
Low-level criminal activity, 85
M
Mafia, 175, 178–181, 191–194, 196–198
criminal careers (see Criminal careers)
criminal organization, 254, 255, 257, 258
developmental trajectories, 250
PMM (see Proton Mafia Members
dataset (PMM))
types, 241, 243
“Mafia Association”, 263
Marital status, 99
Masochistic personality disorder, 272, 273
Mental health, 105
Mental illness, 135
Meta-analysis, 43, 44, 48
Millon Clinical Multiaxial Inventory-III
(MCMI-III), 270, 271
Mobility, 301, 302
Money-laundering, 195
Money mules, 294
Multi-dimensionality, legitimacy, 107
Multivariate logistical analysis
control variables, 135, 137
criminal history and participation, 136, 137
dependent variable, 134
descriptions, 134
341
independent variable, 134
juvenile offending, 138, 139
missing data, 136
variables, 136
Muslim extremism, 167
N
National Security, 87, 90–92, 96, 99
Netherlands, 12, 315, 316
drug trafficking (see Drug trafficking)
functions, 12
logistical nodes, 278, 280–282, 300,
302, 303
transit crime (see Transit crime)
transnational organised crime, 278
Neuropsychological screening, 271
Neuroscience, 269, 273
Neuroscientific tools, 8, 176
Neutralising security checks, 289, 301
Non-ideological crime, 122, 125, 126, 128,
130, 133
Non-ideological criminal behaviour, 123, 124
Non-ideological criminality, 122
Non-ideological delinquency, 129
Non-ideological predictors, 122, 138, 139
Non-organized crime (NOC), 269–272
Non-violent crimes, 122, 129
Non-violent extremism, 136
Non-violent extremists, 124, 128
Non-violent offences, 89
Non-violent offenders, 99
Non-violent terrorism offenders, 89
Non-violent vs. violent political extremists, 129
Non-Western immigrants, 149
O
Occupational embeddedness, 12
Offender convergence settings, 280, 293, 295
Offending trajectories
characteristics, 326
development, 328
and employment, 328, 331
life outcomes, 330–331
Operationalization, validity, 31
Opposition to the West, 30
Ordinary least square regressions, 41
Organised crime (OC)
co-offenders, 12
occupational embeddedness, 12
port employees, 12
social bonds, 12
types of tactics, 12
Index
342
Organization for Security and Co-operation in
Europe (OSCE), 2
Organizational affiliation, 90, 92
Organized crime (OC)
activities, 3
air and sea ports, 14
competitive economies, 2
concept, 198
consumption inequality, 218, 227
criminal careers, 278
criminal history, 14
definition, 177–178, 198
economic risk factors, 177
economy, 2
factors, 212–214
family ties and jobs, 277
illegal enterprises, 1
implications, 199
inequality, 218, 227
latent factor, 211
measures, 227
Calderoni Mean Index, 211
Calderoni rank Index, 211
dynamic factor model, 207, 211, 213
indirect, 212
type I and II crimes, 208
variables, 210
mechanisms, 278
multinational governmental bodies, 2
Netherlands (see Netherlands)
OCGs (see Organized crime
groups (OCGs))
organizations, 2
P90/P10 index, 218
painstaking empirical research, 3
personality (see Personality)
PROTON, 4, 13
recruitment, 4, 175–177
risk factors, 13
social embeddedness, 175
social mobility, 11
social ties, 175
socio-economic factors, 13
socio-economic mobility, 227
transit crime (see Transit crime)
transnational organised crime, 278
Organized crime groups (OCGs), 10, 11
age, 190
consolidation, 175
cooperating/co-offending, 177
criminal background and skills, 195
and criminal careers, 176
criminal co-operations, 176
data collection, 181
DTOs, 178
economic conditions, 192, 193
economic risk factors, 176
educational background, 192
emergence, 176
employment, 192
ethnicity, 191
factor categories per type of study,
189, 190
full-text screening, 179
gender, 191
and geographic area, 197
group identity, 194
identification, 189, 197
limitations, 198
mafias, 178
members, 197
methods of analysis, 181
mixed-methods studies, 188
opportunities, 176
psychological factors, 176, 194, 195
psychological traits, 176
qualitative studies, 184–187
quantitative studies, 181–183, 197
resilience, 175
silence/omertà, 196
skills/expertise, 176
social factors, 175
social ties, 193, 194
socio-economic and psychological
factors, 189
source types, 180
vs. street gangs, 178
types, 178, 197, 198
P
PACE Code of Ethics, 111
Palestinian Authority (PA), 91, 92, 100
Palestinian organizations, 90
Parties/voters, 31
Penal Code, 150
Perceived threats, 153
psychological and criminological
notions, 149
types, 153
Personality
disorders, 270
DSM-5, 270
logistic regression analysis, 272
masochistic behaviours, 272
masochistic personality disorder, 272
masochistic profile, 273
MCMI-III, 271
Index
multifactorial construct, 269
neuropsychological tests, 271
neuropsychological/cognitive profile, OC
members, 273
OC vs. NOC prisoners, 271
participants, 270
profile, OC members, 272
psychological/behavioural
characteristics, 273
relational attachment, 272
statistical analyses, 271
Personality-trait related factors, 13
Personal Records Database (BRP), 155
PEW Research Centre, 150
Police anti-terror practices, 109
Police behaviour, 109
Police legitimacy, 62, 106
Police raids, 113
Policy implications, 139
Policy makers, 140
Policy making process, 177
Political extremism, 121, 122, 130, 139–141
Political turbulences, 150
Political violence, 127
in US, 125
Port employees, 12
Port of Rotterdam, 282
Post-radicalization violent extremism,
124, 126
Predictive quality, satisfactory level, 32
Predictors, 33
Pre-post group comparison, 61
Pre-radicalization crime rates,
U.S. extremists
criminal histories, 129–131
in non-violent crimes, 129
non-violent vs. violent political
extremists, 129
in PIRUS database, 129, 130
Pre-radicalization
criminal activity, U.S. extremists
criminal behaviours, 131–133
criminal histories, 132
PIRUS data, 132, 133
violent extremists, 132
Pre-radicalization criminal behaviour, 122
Pre-radicalization criminality, 126
Previous criminal behaviour, 123, 124
Prior criminality, 14, 15
Prior security convictions, 91, 93, 94
Prison-based programs, 88
Prisoners, 270
Proactive contacts, 111
PROBIT models, 41
343
Procedural (in)justice
Bottoms-Tankebe model, 107
component, 109
contextual influences, 109
correlational studies, 108
counter-terrorism practices, 115
crime prevention, 110
criminal involvement, 110
in criminology, 107
decision-making/judgment-making
processes, 112
description, 107
evidence base, 109
explanation-voice dimension captures, 107
factorial surveys, 112
high procedural justice raid condition, 113
impartiality, 108
in-situ application, 116
legal authorities, 107
legitimacy, 107
low procedural justice condition, 113
LSOA, 112
participant, 112
perceived risk of recruitment, 113
person’s membership in society, 108
police raids, 113
post-facto strategy, 116
potential differences, 116
principles, 116
quality of decision-making, 107
quality of interpersonal treatment, 107
security screening tactics, 109
social inclusion, 109
statistics, experimental condition, 114
street interaction, 112
street stop, 113
terrorism policing, 109
treatment, 108, 109
trustworthy motives, 108
t-tests, 114, 115
various structural and individual
factors, 105
Procedural justice script, 115
Procedural justice theory, 70
Procedurally unjust street-level
encounters, 115
Profiles of Individual Radicalization in the
United States (PIRUS) database,
122, 123, 126–134, 136–139
Protective factors, 9, 15, 89
characteristics, 58
classification, 62
conceptual and methodological
discussions, 58
Index
344
Protective factors (cont.)
data base, 70
de-radicalization, 57–59
disengagement, 57–59
double face, 67
individual and social resources, 57
investigated, 59
knowledge, 57
limitations, 70, 71
vs. political and religious
extremism, 62–64
radical attitudes, 43, 44
radical behaviours, 44, 47
radical intentions/willingness, 43, 46
vs. radicalization, 62–64
and resilience, 56–58
self-control, 66, 67
societal connectedness, 48
specification, 59
PROTON, 4
Proton Mafia Members dataset
(PMM), 11, 244
Casellario dataset, 242
definition, 243
duration, 244
escalation, 245
frequency, 244
mafia association, 243
participation, 243
socio-demographic data, 243
socio-demographic variables, 263
specialization, 244
variable, 244, 245
Psychological factors, 6, 8, 10, 152
Psychology, 269, 273
Psychopathy, 176
Public and violent anti-demonstrations, 151
Public disorder offences, 91, 92
Q
Qualitative assessments, 101
Qualitative methodologies, 26
Qualitative/mixed-methods approaches, 180
Qualitative studies
coding, 60, 61
cost-benefit-analysis, 66
de-radicalization, 59, 62, 65, 66, 69
disengagement, 61, 62, 65, 66, 69
guidelines, 59
limitations, 70, 71
in Netherlands
adverse experiences, 163
codes, 161
coping strategies and narratives,
164, 165
detainees, 161
early family life, 163, 164
education, 161
employment, 161, 162
housing, 162
identity and belonging, 164
informants, 160, 161
instrument, 160
perceived threat (see Perceived threat
and individual involvement)
religion (Islam), 165
search for belonging, 164
search for meaning, 164
socio-economic and personal
adversities, 160
socio-economic variables, 162, 163
terrorism units, 160
push and pull factors, 66, 69
self-reported disengagement, 62
Quality of marriage, 89
Quantitative methods, 26, 33
Quantitative research, 26, 47
Quantitative studies, 161, 166, 168
characteristics, 60, 61, 72
coding, 60, 61
community
society factors, 68, 69
society level, 64
family factors, 67
family level, 62
identification and synthesis, 33
individual factors, 67
individual level, 62
limitations, 70, 71
origin, SES and criminality, 156
peer group factors, 68
peer group influences, 64
protective factors, 62–64
school factors, 68
school level, 62
self-control, 66
socio-economic determinants (see
Socio-economic determinants)
statistical tests, 62
R
Radical extremism, 141
Radicalization, 121, 150, 152, 153, 167
agents, 28
Al Qaida violent extremism, 29, 30
attitudes and behaviour, 55
Index
beliefs, 9
characteristics, 28
community related factors, 29
conception, 30, 31, 33
definition, 28, 31, 55
dependent variables, 30
development, 26
factors, 29
FBI definition, 121
goal, 5
independent variables, 30
individual-level factors, 29
instruments, 57
macro and exo-systemic factors, 29
phases, 56, 66, 69
propensity, 71
protective factors, 9
psychological factors, 6
qualitative methodologies, 26
quantitative research, 26
recruitment, 5
relational/group based factors, 29
research, 31–32
risk factors, 26, 46
vs. shields of resilience, 70
social prevention, 28
socio-economic status, 6
subjective beliefs, 6
sub-literature, 26
support for terrorism, 30
systematic reviews, 26, 27
terrorism literature, 27, 28
type, 64
and violent extremism (see Violent
extremism)
in western countries, 33
Recidivism, 9
advantages, 90
affiliation, 97
age at first incarceration, 94, 95
age at time of release, 94, 95
analysis, 93
characteristics, 90
criminology, 86
declining rates, 98
incapacitation period, 98
incarceration, 98
IPS (see Israel Prison Service (IPS))
length of sentence served, 95, 96
marital status, 97
marker, 85
measure, 86
observation period, 87
offence type, 96
345
offenders, 85
organizational affiliation, 100
prior security convictions, 93, 94
pull and push factors, 88
qualitative assessments, 101
rates, 87, 88, 93
recidivism rates, 86
and recidivism-related risk factors, 97
risk factors, 85, 86, 88–90, 99, 101
scholars, 88
security offenders, 98
statistics, 85, 87
type of offending, 86
Recruitment
career criminals, 7
co-offenders, 7
criminal expertise, 14
criminal records, 14
economic factors, 7
individual-level risk factors, 4
inequality, 7
involvement mechanisms, 7
low self-control acts, 13
neuroscientific tools, 8
OC, 3, 175–177
OCGs, 10, 11
police agencies, 4
protective factors, 9
psychological factors, 8
and radicalization, 5, 6
risk factors, 15
self-reinforcing mechanisms, 7
situational factors, 4
social factors, 6, 7
social mobility, 7
socio-demographic factors, 4
terrorism, 4–6
work relations, 7
work settings, 7
Regression-based multiple imputation
operates, 136
Regression models, 41, 46
Relative mobility, 216
Religious affiliation, 149
Resilience
healthy development, 57
and protective factors, 56–58
shields of resilience, 66, 69, 70
vs. violent, 62
Right-wing authoritarian personality
(RWA), 31
Right-wing extremism, 62
Right-wing extremists, 151
Risk assessment, 57, 101
346
Risk factors, 176, 177, 180, 196, 199
background characteristics and
demographic factors, 48
combined and cumulative effect, 28
framework, 32
individual-level, 35
opposite/reverse, 48
quantitative, 57
radical attitudes, 45
radical behaviors, 33, 44, 47
radical intentions/willingness, 43, 46
radicalization, 26
radicalizing agents, 28
recidivism, 86, 88–90
societal disconnectedness, 48
Risk markers, 56
S
Saudi Arabia, 88
Search strategy, 35
Security agencies, 87, 105
Security checks, 287–289
Security offences, 90
Security offenders, 86, 91, 98
Security personnel, 302
Security prisoners, 90, 92, 98
Security threats, 150
Segregation, 206
Self-control theory, 70
Self-identified Muslims survey in UK, 116
Self-reinforcing mechanisms, 7
SEM models, 46
Sentence length, 89
Sex offenders, 86
Shields of resilience, 57
Sicilian Mafia, 251, 254
“Significance loss”, 152
Silence/omertà, 196
Smuggling methods, 278, 284, 286, 303, 304
Snowball method, 59
Social bonds, 12, 293, 295, 301
Social information processing, 70
Social learning theory, 69, 70
Social mobility, 7, 11
vs. income inequality, 237
inequality, 237
OC, 205, 207, 237
Social opportunity structure, 311
Social/psychological/economic factors, OCGs
age, 190
criminal background and skills, 195
economic conditions, 192, 193
educational background, 192
Index
employment, 192
ethnicity, 191
gender, 191
group identity, 194
silence/omertà, 196
social ties, 193, 194
Social-psychological theories, 32
Social relations, 294
Social snowball effect, 175
Social snowball method, 298
Social ties, 175, 193, 194, 279
Socio-demographic characteristics, 112
Socio-demographic factors, 43
Socio-economic determinants
anonymized database, 155
BRP, 155
datasets, Statistic Netherlands, 156
demographic descriptives, 156
descriptive statistics, 155
Dutch prosecution office, 155
education levels, 157
identifiable data, 155
logistic regression analyses, 155
logistic regression models, 158, 159
non-immigrant background, 158
origin, SES and criminality, 157
terrorism suspects and factor, 158
variables, 156
Socio-economic factors, 13, 15
crime-terror nexus, 152
disadvantage, 152
Dutch terrorism, 152
group categorization, 153
group violence, 153
Jihadi travellers, 152
and marginalization, 152
perceived threat, 153
personal deprivation and strains, 153
social milieu, 152
unemployment, 152
Socio-economic mobility
cross-sectional regressions, 217, 232
inequality, 215, 216
OC, 227
Socio-economic status (SES), 43, 48, 153
Socio-economic variables, 162, 163
Socio-political context, 149–151
Socio-psychological factors, 6
Strain theory, 69
Street stops vs. domestic raids, 116
Structural equation modelling (SEM), 41
Support for terrorism, 31
Survey on Household Income and Wealth
(SHIW), 208
Index
Suspect community, 106
Systematic reviews
ability, 32
democratic vs. non-democratic
countries, 34
development, 28
effectiveness of counter-terrorism
strategies, 28
extensive and rigorous search, 198
protective factors, 66
qualitative methods, 196
quantitative methods, 196
quantitative results, 58
radicalization, 26, 27
research designs, 34, 35
research questions, 177
search process, 59, 60
search strategy, 179, 180
search terms, 59
social and economic factors, 196
standards, 31
Systematic screening, 179
T
Terrorism
attitudinal and behavioral aspects, 148
criminological perspective, 97
definition, 5, 55
explosion, 25
goals, 2
government, 1
impacts, 2
instruments, 57
intentional act/threat of violence, 55
literature (see Literature)
macro-level predictors, 34
multi-disciplinary attention, 27 (see also
Organized crime (OC))
police legitimacy, 14
prior criminality, 14
and procedural injustice, 107–110
radicalization, 5, 6
re-categorized/re-analyzed, 27
recidivism, 9
recruitment, 5, 6
researchers, 27
social organization, 1
socio-demographic factors, 4
systematic reviews, 8
types, 71
unemployment, 6
in US, 122
and violent groups, 69
347
Terrorism Act 2000, 110
Terrorism Act 2006, 110
Terrorism offences, 87, 89, 98
Terrorism offenders, 85, 87, 89, 90, 97, 98,
100, 101
Terrorism offending, 88–90
Terrorism policing, 109
Terrorism-related crime, 122
Terrorism-related offences, 98
Terrorism-related research, 121
Terrorism Situation and Trend Report
(TE-STAT), 88
Terrorism units, 160
Terrorist Crime Act, 149
Terrorist ideology, 123, 127
Terrorist offenses, 148, 149, 155–158, 160,
162, 166, 167
Terrorist organizations, 90
Terrorist suspects, 148, 149, 151, 152,
155–162, 166–168
Terrorist units, 149, 160–165, 168
Theory of Planned Behavior model, 32
Threat management system, 153
Threat model of terrorism
categorization, 149
discrimination/segregation, 154
distal and proximal sources, 154
personal zone, 154
psychological factors (see Psychological
factors)
socio-economic determinants,
155–160
socio-economic factors (see Socio-­
economic factors)
socio-political context, 149–151
suicide terrorism, 155
Traditional criminogenic, 9
Transit crime
Amsterdam Airport Schiphol, 281
deliberate recruitment, 279
description, 278
drug trafficking (see Drug trafficking)
EMCDDA, 280
leisure activities and sidelines, 280
life events, 279, 280
Netherlands, 279–281, 310
offender convergence
settings, 280
Port of Rotterdam, 282
social bonding, 279
social ties, 279
transport drugs, 280
work ties, 279
Trustworthy motives, 108
Index
348
T-tests
perceived risk, terrorism recruitment,
114, 115
Two-Pyramid Model’s, 32
U
Unbiased decision makers, 108
Unemployment, 152, 162
Unintended negative outcomes, 105
United Nations Office on Drugs and Crime
(UNODC), 2
U.S. extremists
age of crime onset, 134
pre-radicalization crime rates,
129–131
pre-radicalization criminal
activity, 131–133
V
VERA-2, 57
Violence-justifying beliefs, 135
Violence-permissive attitudes, 149
Violent action, 149
Violent activity, 29
Violent and non-violent terrorism-related
offences, 86
Violent behaviour, 61, 99
Violent crimes, 122, 123, 125, 126, 130,
132–134, 136, 140
Violent extremism, 28, 32, 121–124, 126, 129,
133, 134, 136–142
Violent offenders, 99
W
War on terrorism, 30
Download